

Tim Ferrill
Tim Ferrill is an IT professional and writer living in Southern California. He has covered Windows, Windows Phone, and Windows Server for several publications, including CITEworld and InfoWorld.

10 dark web monitoring tools
Enterprises looking to get ahead of data breaches and data leaks can benefit from using dark web monitoring tools and scan for personally identifiable information and even respond to attacks. Here is a list of 10 such tools.

11 top XDR tools and how to evaluate them
Extended detection and response tools provide a deeper and more automated means to identify and respond to threats. These are some of the most popular options.

How to enable event collection in Windows Server
SIEM and SOAR allow enterprises to collect and correlate log event data but may not be the ideal choice for every organization. Microsoft’s Windows Event Forwarding aggregates system event logs from disparate systems.

How to securely manage LAPS on a Windows network
Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.

8 top multi-factor authentication products and how to choose an MFA solution
Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

Top 12 managed detection and response solutions
These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

10 top anti-phishing tools and services
Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

The 7 best password managers for business
A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

How to choose an endpoint protection suite
Endpoint protection has come a long way since the days of dedicated antivirus servers. Here are the basic and more advanced features to look for in an enterprise endpoint protection suite.

10 security tools all remote employees should have
Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.

How to choose a SIEM solution: 11 key features and considerations
Get a clear, consolidated view of events and threats across your entire enterprise with SIEM (security and event management). Here’s how to select the best SIEM solution based on your company’s unique assortment of needs.