Tim Ferrill

Tim Ferrill is an IT professional and writer living in Southern California. He has covered Windows, Windows Phone, and Windows Server for several publications, including CITEworld and InfoWorld.

How to securely manage LAPS on a Windows network

8 top multi-factor authentication products and how to choose an MFA solution

8 top multi-factor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

Top 12 managed detection and response solutions

Top 12 managed detection and response solutions

These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

10 top anti-phishing tools and services

10 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

The 7 best password managers for business

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

How to choose an endpoint protection suite

How to choose an endpoint protection suite

Endpoint protection has come a long way since the days of dedicated antivirus servers. Here are the basic and more advanced features to look for in an enterprise endpoint protection suite.

10 security tools all remote employees should have

10 security tools all remote employees should have

Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.

How to choose a SIEM solution: 11 key features and considerations

How to choose a SIEM solution: 11 key features and considerations

Get a clear, consolidated view of events and threats across your entire enterprise with SIEM (security and event management). Here’s how to select the best SIEM solution based on your company’s unique assortment of needs.

Silo for Safe Access: A more secure web browser for some use cases

Silo for Safe Access: A more secure web browser for some use cases

Authentic8's Silo is a sandboxed web browser designed to protect users and systems from malicious code. It can be a more secure option than VPNs or virtual desktops in some cases.

9 container security tools, and why you need them

9 container security tools, and why you need them

Most traditional security tools won't help with protecting container data and images. These options were built specifically for container security.

Protocol analyzers: Who needs them, and how to choose one

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro.

Top mobile VPNs for the enterprise

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need.

Load More