Creating your patch management strategy

Patch management causes headaches. Just ask any IT manager or sysadmin! How do you keep all your systems patched against the never ending onslaught of security vulnerabilities?

Continue reading

How to keep mission critical email online

Email is the lifeblood of your business. Your sales team uses it every day to deliver quotes and keep in touch with your customers. Your customers use it to submit orders to you.

Continue reading

Two new platforms, more ways to automate and secure

It’s certainly been a busy few months here at GFI Software. Our developers have been busy finalising not one but two brand new products that have been in Beta since the end of November.

Continue reading

Unlock extreme business advantage with GFI Prime

At GFI, our goal is to create the best experience and biggest value for our customers. That’s why we’re upping the ante on how we reward our most loyal customers.

Continue reading

Six tips for donating technology

One man’s trash is another man’s treasure and considering just what goes into tech manufacturing, you sure don’t want to just let that stuff go to a landfill.

Continue reading

GFI Software acquires Kerio Technologies’ Kerio Connect, Kerio Control, Kerio Operator and Kerio Cloud products

GFI Software announced today the acquisition of the Kerio Connect, Kerio Control, Kerio Operator and Kerio Cloud, products from Kerio Technologies.

Continue reading

Fear and loathing in Shadow IT

Shadow IT-it sounds like a really cool specialty, doesn’t it? “I’m a DBA, what do you do?” “It’s classified. I’m from Shadow IT.” But Shadow IT is anything but cool.

Continue reading

Your employees: The most important layer of security

Layered security, sometimes called defense in depth, is a security strategy that involves multiple, overlapping and complementary protections to help ensure the safety and security of critical systems and data.

Continue reading

Let’s make 2016 the year of 2FA

There is one small, little, thing that could make the difference between a secure infrastructure and front-page news – it’s how you authenticate!

Continue reading

How much does your stolen data go for?

Why would anyone want to hack us? What have we got that can’t be found elsewhere more easily? Yes, those questions are asked countless times in boardrooms of companies both large and small.

Continue reading