author-image

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

In this article, we explain everything you need to know about web performance monitoring, why it is important, and a brief look at some of the best web performance monitoring solutions in the market.
By Amakiri Welekwe in Net Admin on September 14, 2023
With such a huge range of NAC applications out there, choosing the right one for your business and budget can be challenging. In this article, we’re going to review the six best NAC applications in the market.
By Amakiri Welekwe in Net Admin on June 15, 2023
Cyber crooks target Active Directory networks to gain access to company data. In this article, we discuss AD security groups, permissions, tools and best practices, to help you gain deeper insight into how to protect your Windows network. 
By Amakiri Welekwe in Net Admin on April 23, 2024
In this article, we explain everything you need to know about Active Directory service accounts, how to create them in PowerShell, and the best tools for managing them.
By Amakiri Welekwe in Net Admin on January 27, 2023
In this piece, we explain everything you need to know about SIEM, how it works, why it's important, choosing the right one for your organization, and a list of the best SIEM tools on the market.
By Amakiri Welekwe in Net Admin on July 25, 2023
In this piece, we explain everything you need to know about about Synthetic and Real User Monitoring, the advantages and disadvantages of each, and how they compare to each other.
By Amakiri Welekwe in Net Admin on January 16, 2021
In this tutorial we look at Port Address Translation and Network Address Translation (NAT) Overloading. Includes illustrations and commands,
By Amakiri Welekwe in Net Admin on February 1, 2022
A Software-Defined Perimeter (SDP) solution creates secure connections between users and the resources they need to access. It does this by individually verifying each user's identity and granting them access only to the specific resources they are authorized to use. In this article, we’re going to review the six best SDP solutions in the market.
By Amakiri Welekwe in Net Admin on April 1, 2024
With a variety of ZTNA solutions now available, choosing the right one for your organization and budget can be challenging. We show you the best zero-trust networking software solutions.
By Amakiri Welekwe in Net Admin on April 1, 2024
Page 21 of 23