Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

GFI holds Partner Conference for Czech and Slovak Partners

on April 18, 2011

The annual partner event was held on Tuesday, April 12, with almost 200 Czech and Slovak partners attending. Also present for the event were GFI members, namely Simon Azzopardi (VP, APAC Sales), Paul Eldridge (Director of Channel Marketing EMEA & …

0

How to Detect Network Intruders (Part 1)

on April 18, 2011

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …

6

Is Spam a form of Marketing/Advertising?

on April 15, 2011

Arguably, spam forms part of the email marketing tool used by marketers for direct advertising.  We never asked for or subscribed to most marketing messages that we receive on a daily basis. So how is spam different? Let’s first take …

5

GFI Software Collaborates with Intel for Cloud Computing among SMEs

on April 14, 2011

The following GFI Software solutions, GFI VIPRE® Antivirus, GFI LANguard™, GFI EventsManager™ and GFI EndPointSecurity™, are now available for resale by VARs and MSPs through the Intel® Hybrid Cloud. SMBs are increasingly aware of the cost savings and efficiencies they …

0

How to repair PST files

on April 13, 2011

One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …

2

Why the Need for Internet Monitoring?

on April 11, 2011

There are many dangers that a company might face on a day to day basis and while some of these can be mitigated by enacting effective policies, this will only help up to a certain extent. Consider the Web for …

4

Explaining Botnets

on April 7, 2011

If one were to ask people, ‘What is the most annoying thing they experience on the internet?’ it’s safe to assume that most will name spam as their No. 1 annoyance. The main driver for spam is obviously money. People …

5

How Internet Monitoring can Save your Organization

on April 6, 2011

I have often written about episodes where security fails, even in cases when it should not have, had basic good practices been followed. So one might ask, ‘why don’t we hear about many success stories?’ A reason for that is …

1

Why Prevention is Better than Cure when it comes to IT Security

on April 5, 2011

Recently I came across two different stories that made me wonder why companies fail to take security seriously until after they fall victims to attacks. The first story, as reported by The Register, reports system failure as being the number …

3

How End Point Security Software Can Prevent Data Theft

on April 4, 2011

Data thefts in corporate environments happen quite often although many of them remain unnoticed for a long time. Small and medium sized organizations are usually the most badly affected, especially when no security measurements are in place within the IT …

3