Amakiri Welekwe

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

Active Directory is one of the most important components in any Windows network. Having no AD backup strategy could put your organization at risk. We provide a step-by-step guide on how to backup Active Directory running on Windows Server. 
By Amakiri Welekwe in Net Admin on November 30, 2024
In this article, we discuss network firewall security, the different types, firewall architecture designs, and choosing the right one for your business.
By Amakiri Welekwe in Net Admin on March 7, 2025
With a variety of Network Detection & Response (NDR) solutions out there, choosing the right one for your business and budget can be challenging. In this article, we’re going to review the five best NDR solutions on the market.
By Amakiri Welekwe in Net Admin on February 11, 2025
Discover what fog computing is all about and find out if your business is ripe for this technology.
By Amakiri Welekwe in Net Admin on March 10, 2025
With a variety of open-source SIEM solutions out there, choosing the right one for your business and budget can be challenging. In this article, we present a review of the best open-source SIEM solutions. 
By Amakiri Welekwe in Net Admin on November 21, 2024
With such a huge range of UTM applications available, choosing the right one for your business and budget can be challenging. We review the best UTM applications on the market. 
By Amakiri Welekwe in Net Admin on February 18, 2025
In this article, we explain everything you need to know about web performance monitoring, why it is important, and a brief look at some of the best web performance monitoring solutions in the market.
By Amakiri Welekwe in Net Admin on January 13, 2025
With such a huge range of NAC applications out there, choosing the right one for your business and budget can be challenging. In this article, we’re going to review the six best NAC applications in the market.
By Amakiri Welekwe in Net Admin on March 7, 2025
Cyber crooks target Active Directory networks to gain access to company data. In this article, we discuss AD security groups, permissions, tools, and best practices, to help you gain deeper insight into how to protect your Windows network. 
By Amakiri Welekwe in Net Admin on February 21, 2025
Page 25 of 28