author-image

Tim Keary

Tim writes extensively on network administration topics helping businesses and entrepreneurs to keep their data and assets protected. He was previously the cybersecurity editor at VentureBeat and has been freelance since 2017.

Articles by Tim

As cybercriminals become more adept at side-stepping traditional firewalls, next-gen firewalls have become an essential cybersecurity tool. They provide organizations with better visibility, control, and protection against evolving cyber threats in today's complex network environments.
By Tim Keary in Net Admin on March 21, 2024
We look at some Microsoft Azure best practices you can implement to secure your cloud resources and some top Azure monitoring tools.
By Tim Keary in Net Admin on September 8, 2023
We show you how to secure MongoDB. Includes MongoDB best practices and top monitoring tools.
By Tim Keary in Net Admin on August 10, 2023
Detecting cyber attacks isn’t just configuring some alerts and responding. In this article, we’re going to look at the eight best security analytics software.
By Tim Keary in Net Admin on July 12, 2023
While there are many database design software providers, it can be difficult to distinguish between them. We take a look at the nine best database design software on the market.
By Tim Keary in Net Admin on April 17, 2024
A single system failure can lose years of files in a matter of seconds. We review the thirteen best disk imaging software on the market.
By Tim Keary in Net Admin on March 12, 2024
System failures are an unavoidable part of running a modern business. Sometimes, even the most well-maintained systems go down. We show you the best hard drive cloning software on the market. 
By Tim Keary in Net Admin on February 23, 2024
Hadoop monitoring is essential for making sure that a cluster runs efficiently. In this article, we’re going to look at how to monitor Hadoop and we review the best Hadoop monitoring tools.
By Tim Keary in Net Admin on January 9, 2024
Whether you’re working toward PCI DSS compliance or simply trying to keep your environment secure, external vulnerability scanning should be a core part of your cybersecurity strategy because it gives you an opportunity to shut down vulnerabilities before an attacker has a chance to exploit them. In this guide we look at how to perform an external vulnerability scan.
By Tim Keary in Net Admin on January 17, 2022
Page 3 of 21