Barney's Blog

Blog archive

GFI Has Eyes for Sunbelt

Sunbelt is one of my favorite companies. Going up against the likes of Symantec, McAfee and Trend Micro, Sunbelt has won over many an account with Vipre, a lean, mean, malware-fighting machine.

Another of my favorites, GFI Software, is headed by an amazing entrepreneur -- one Walter Scott, who is now based on the island of Malta (yeah, I'm plenty jealous!).

Now, hopefully, we'll see the best of both worlds as GFI just bought Sunbelt. GFI plans to integrate Sunbelt products into its own portfolio.

I'm actually kind of bummed about this. Sunbelt has done an amazing job building its brand and trying to topple the big boys. I hate to see this name disappear.

On the other hand, GFI now has a much broader and deeper product set and will clearly be a company to watch. I'm sure Symantec will keep its eyes open.

Are you a GFI or Sunbelt customer? What are your thoughts? Shoot them to [email protected].

Posted by Doug Barney on July 16, 2010


Featured

  • Blue Nebula Graphic

    Are Zero Backups About to Become Relevant?

    Traditional backups remain essential, but their growing security, legal, and operational risks raise the question of whether limited or "zero backup" strategies might someday offer advantages -- if their major shortcomings can be addressed.

  • GitHub Abuse Emerges in Twin Social Engineering Campaigns Spotted by Fortra, Trend Micro

    Security researchers are tracking two separate GitHub-related threat campaigns that use the platform's infrastructure in different ways -- one to deliver vishing lures through legitimate GitHub notifications, and another to push Windows users toward malware-infected downloads hosted through deceptive GitHub Pages and repositories.

  • Gold Highway Small Graphic

    Challenges With Using RemoteApp to Host Custom Applications Part 2

    Running custom PowerShell scripts through RemoteApp can work effectively, but administrators may encounter several practical challenges involving script launching, execution policies, file blocking, and display scaling.

  • Signed Malware Impersonating Workplace Apps Used To Deploy RMM Backdoors

    Microsoft's Defender Security Research Team has identified a series of phishing campaigns in which an unknown attacker used digitally signed malware masked as common workplace applications to deploy remote monitoring and management tools as persistent backdoors on targeted systems.

Subscribe on YouTube