Tim Keary

Tim Keary

Tim writes extensively on network administration topics helping businesses and entrepreneurs to keep their data and assets protected. He was previously the cybersecurity editor at VentureBeat and has been freelance since 2017.

Articles by Tim

As cybercriminals become more adept at side-stepping traditional firewalls, next-gen firewalls have become an essential cybersecurity tool. They provide organizations with better visibility, control, and protection against evolving cyber threats in today's complex network environments.
By Tim Keary in Net Admin on December 17, 2024
We look at some Microsoft Azure best practices you can implement to secure your cloud resources and some top Azure monitoring tools.
By Tim Keary in Net Admin on December 3, 2024
We show you how to secure MongoDB. Includes MongoDB best practices and top monitoring tools.
By Tim Keary in Net Admin on August 10, 2023
Detecting cyber attacks isn’t just configuring some alerts and responding. In this article, we’re going to look at the eight best security analytics software.
By Tim Keary in Net Admin on June 27, 2024
While there are many database design software providers, it can be difficult to distinguish between them. We take a look at the nine best database design software on the market.
By Tim Keary in Net Admin on December 3, 2024
A single system failure can lose years of files in a matter of seconds. We review the thirteen best disk imaging software on the market.
By Tim Keary in Net Admin on November 21, 2024
System failures are an unavoidable part of running a modern business. Sometimes, even the most well-maintained systems go down. We show you the best hard drive cloning software on the market. 
By Tim Keary in Net Admin on November 19, 2024
Hadoop monitoring is essential for making sure that a cluster runs efficiently. In this article, we’re going to look at how to monitor Hadoop and we review the best Hadoop monitoring tools.
By Tim Keary in Net Admin on June 26, 2024
External vulnerability scanning is essential for PCI DSS compliance and securing your environment. It helps close vulnerabilities before attackers exploit them. This guide covers how to perform an external vulnerability scan.
By Tim Keary in Net Admin on January 8, 2025
Page 3 of 21