Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
The main goal of every administrator is to automate most of the daily routines that consume much of the allocated time that could otherwise be spent researching new technologies or ways on how to improve the current system. The time …
Are you ready for the GFI MAX Snowboard Challenge? With a busy 2009 behind him, MAX has decided to spend his time-off on the slopes competing in the GFI MAX Snowboard Challenge. Join him and navigate through the obstacles, to …
We’re proud to announce that GFI Network Server Monitor was named a bronze medal winner of the “2009 Editors’ Best Awards” in the Best System Utility category by Penton Media’s Windows IT Pro magazine.
We are pleased to announce that three of our products – GFI EndPointSecurity™, GFI EventsManager™ and GFI Network Server Monitor™ – have been named winners of the “2009 Community Choice Awards” by Penton Media’s Windows IT Pro magazine.
In a world where a sizable part of any company’s assets or management thereof resides in a computer system, it is more than sensible to expect those systems to be as highly protected as possible. In most cases all the …
USB has become a very popular interface over the years. Plenty of devices have been developed that provide a USB interface such as cameras, phones, music players, the list is endless. While this is a useful technology, some of these …
I recently had an interesting conversation with the editor of a non-profit business publication in the US. We were talking about the results of a recent survey that GFI had commissioned and the editor seemed somewhat surprised that so many …
Protecting Your Passwords and Confidential information We all know how important a password can be. This is especially true when that password is used on multiple systems. In my past articles I have talked about how to protect one’s passwords …
Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb drives, smart phones and other portable devices has increased the risk of data leakage and the …
We are always keen to know what IT support companies think about, what keeps them awake at night and of course what do (and would like to do) with our software, what their problems are, how our software can help. …