Tim Ferrill

Tim Ferrill is an IT professional and writer living in Southern California. He has covered Windows, Windows Phone, and Windows Server for several publications, including CITEworld and InfoWorld.

9 attack surface discovery and management tools

10 dark web monitoring tools

10 dark web monitoring tools

Enterprises looking to get ahead of data breaches and data leaks can benefit from using dark web monitoring tools and scan for personally identifiable information and even respond to attacks. Here is a list of 10 such tools.

11 top XDR tools and how to evaluate them

11 top XDR tools and how to evaluate them

Extended detection and response tools provide a deeper and more automated means to identify and respond to threats. These are some of the most popular options.

How to enable event collection in Windows Server

How to enable event collection in Windows Server

SIEM and SOAR allow enterprises to collect and correlate log event data but may not be the ideal choice for every organization. Microsoft’s Windows Event Forwarding aggregates system event logs from disparate systems.

How to securely manage LAPS on a Windows network

How to securely manage LAPS on a Windows network

Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.

8 top multi-factor authentication products and how to choose an MFA solution

8 top multi-factor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

Top 12 managed detection and response solutions

Top 12 managed detection and response solutions

These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

10 top anti-phishing tools and services

10 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

The 7 best password managers for business

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

How to choose an endpoint protection suite

How to choose an endpoint protection suite

Endpoint protection has come a long way since the days of dedicated antivirus servers. Here are the basic and more advanced features to look for in an enterprise endpoint protection suite.

10 security tools all remote employees should have

10 security tools all remote employees should have

Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.

How to choose a SIEM solution: 11 key features and considerations

How to choose a SIEM solution: 11 key features and considerations

Get a clear, consolidated view of events and threats across your entire enterprise with SIEM (security and event management). Here’s how to select the best SIEM solution based on your company’s unique assortment of needs.

Load More