Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

on September 2, 2013

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …

0
 

The Difficulties in Running a Mail Server

on December 21, 2009

The main goal of every administrator is to automate most of the daily routines that consume much of the allocated time that could otherwise be spent researching new technologies or ways on how to improve the current system. The time …

2

The GFI MAX™ Snowboard Challenge – GFI MAX’s Holiday Competition

on December 18, 2009

Are you ready for the GFI MAX Snowboard Challenge? With a busy 2009 behind him, MAX has decided to spend his time-off on the slopes competing in the GFI MAX Snowboard Challenge. Join him and navigate through the obstacles, to …

0

GFI Network Server Monitor named 2009 Editors’ Best Award winner by Windows IT Pro magazine

on December 18, 2009

We’re proud to announce that GFI Network Server Monitor was named a bronze medal winner of the “2009 Editors’ Best Awards” in the Best System Utility category by Penton Media’s Windows IT Pro magazine.

0

Three GFI products named 2009 Community Choice Awards winner by Windows IT Pro magazine

on December 17, 2009

We are pleased to announce that three of our products – GFI EndPointSecurity™, GFI EventsManager™ and GFI Network Server Monitor™ – have been named winners of the “2009 Community Choice Awards” by Penton Media’s Windows IT Pro magazine.

0

Protecting your assets using one word – The Password

on December 10, 2009

In a world where a sizable part of any company’s assets or management thereof resides in a computer system, it is more than sensible to expect those systems to be as highly protected as possible. In most cases all the …

2

Hacking Devices – USB

on December 9, 2009

USB has become a very popular interface over the years. Plenty of devices have been developed that provide a USB interface such as cameras,  phones, music players, the list is endless. While this is a useful technology, some of these …

2

Five reasons to implement Internet monitoring in your organization

on December 7, 2009

I recently had an interesting conversation with the editor of a non-profit business publication in the US. We were talking about the results of a recent survey that GFI had commissioned and the editor seemed somewhat surprised that so many …

3

Protecting Your Passwords and Confidential Information

on December 4, 2009

Protecting Your Passwords and Confidential information We all know how important a password can be. This is especially true when that password is used on multiple systems. In my past articles I have talked about how to protect one’s passwords …

6

Freeware version of GFI EndPointSecurity released

on December 3, 2009

Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb drives, smart phones and other portable devices has increased the risk of data leakage and the …

0

The best way to deliver IT support to businesses as an MSP

on December 2, 2009

We are always keen to know what IT support companies think about, what keeps them awake at night and of course what do (and would like to do) with our software, what their problems are, how our software can help. …

4