<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How End Point Security Software Can Prevent Data Theft</title>
	<atom:link href="http://www.gfi.com/blog/point-security-software-prevent-data-theft/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/point-security-software-prevent-data-theft/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=point-security-software-prevent-data-theft</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Artie Gains</title>
		<link>http://www.gfi.com/blog/point-security-software-prevent-data-theft/comment-page-1/#comment-29338</link>
		<dc:creator>Artie Gains</dc:creator>
		<pubDate>Fri, 08 Jul 2011 17:30:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3207#comment-29338</guid>
		<description><![CDATA[End point security measures are aimed at data theft prevention, which isn&#039;t always possible but the more you reduce the risks, the better. Too bad many business owners are unaware of the dangers of data leaks.]]></description>
		<content:encoded><![CDATA[<p>End point security measures are aimed at data theft prevention, which isn&#8217;t always possible but the more you reduce the risks, the better. Too bad many business owners are unaware of the dangers of data leaks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Simon Philips</title>
		<link>http://www.gfi.com/blog/point-security-software-prevent-data-theft/comment-page-1/#comment-29001</link>
		<dc:creator>Simon Philips</dc:creator>
		<pubDate>Sun, 17 Apr 2011 12:44:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3207#comment-29001</guid>
		<description><![CDATA[I guess Wikileaks opened the eyes of many executives about what can happen when you don&#039;t take the appropriate measures to secure your information. An endpoint security tool certainly makes it much easier to control potential abuse and for SMEs with tight security budgets, such a tool can prove really efficient, especially in terms of money.]]></description>
		<content:encoded><![CDATA[<p>I guess Wikileaks opened the eyes of many executives about what can happen when you don&#8217;t take the appropriate measures to secure your information. An endpoint security tool certainly makes it much easier to control potential abuse and for SMEs with tight security budgets, such a tool can prove really efficient, especially in terms of money.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Noli Jackman</title>
		<link>http://www.gfi.com/blog/point-security-software-prevent-data-theft/comment-page-1/#comment-28442</link>
		<dc:creator>Noli Jackman</dc:creator>
		<pubDate>Wed, 06 Apr 2011 10:52:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3207#comment-28442</guid>
		<description><![CDATA[Business owners and IT managers should choose the best end point security tool for the company. There are many endpoint security tools out there - each has its own strengths and weaknesses.

An excellent endpoint security system should not only block viruses, spams, adware, spyware, and other malicious programs. It should also reduce  the administrative operating cost.

Moreover, the tool should also be comprehensive and offers preventive protection.]]></description>
		<content:encoded><![CDATA[<p>Business owners and IT managers should choose the best end point security tool for the company. There are many endpoint security tools out there &#8211; each has its own strengths and weaknesses.</p>
<p>An excellent endpoint security system should not only block viruses, spams, adware, spyware, and other malicious programs. It should also reduce  the administrative operating cost.</p>
<p>Moreover, the tool should also be comprehensive and offers preventive protection.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:30:40 by W3 Total Cache --