John

Bio:

Strategic technical support professional with seven years of experience in the information technology space. Combines deep industry knowledge with experience providing top of the line technical support.

The Best PSA Software for MSPs

By John Cirelly on August 19, 2024

Searching for the best PSA software for your MSP? Having worked at an MSP myself, I’ve had the opportunity to test tons of solutions, both in prep for this article and over the years. Continue reading to see what I found. Here is our list of the best PSA software for MSPs: Atera – EDITOR’S […]

The Best Multi-Factor Authentication Tools

By John Cirelly on August 14, 2024

Searching for the best multi-factor authentication tools? We tested all the major platforms to find our top picks for you and your organization. Here is our list of the best multi-factor authentication tools:  ManageEngine ADSelfService Plus – EDITOR’S CHOICE A secure, web-based self-service password management and single sign-on (SSO) solution for Active Directory that includes […]

Active Directory Account Expiration Dates Explained

By John Cirelly on August 12, 2024

AD account expiration dates can be challenging to manage, especially for larger organizations. Below, we’ll touch on some common account questions, and even explore how you can reliably automate your account expirations and access. What Are Active Directory Account Expiration Dates? Active Directory account expiration dates are predefined dates when a user account becomes inactive. […]

What Is Conditional Access? Everything You Need To Know

By John Cirelly on August 8, 2024

Are you curious about Conditional Access? Below, we’ll demystify how it works, how to implement it, and what to avoid when using it across your network. What is Conditional Access? Conditional Access is a security policy framework used to enforce specific access controls based on defined conditions. It evaluates signals such as user identity, location, […]

What Is User Behavior Analytics?

By John Cirelly on August 8, 2024

User behavior analytics can be quite complex, but it doesn’t have to be. Below, I’ll simplify how it works, touch on some best practices, and share some tools and tips to help you get it set up quickly for yourself. What Is User Behavior Analytics? User Behavior Analytics (UBA) focuses on tracking and analyzing user […]

Beginner’s Guide: Grafana

By John Cirelly on May 16, 2024

According to GrafanaLabs, Grafana is an open-source visualization and analytics program. Your data can be queried, viewed, and explored irrespective of the location in which it is stored. Simply said, it gives you the tools you need to transform the data in your time-series database (TSDB) into attractive graphs and visualizations. Why do Companies Utilize […]

Beginner’s Guide: Kibana

By John Cirelly on May 16, 2024

Kibana is a tool that is used for log and time-series analytics, application monitoring, and operational intelligence use cases. It also allows for the visualization and study of data. Histograms, line graphs, pie charts, heat maps, and built-in support for geographic analysis are just some of the sophisticated and user-friendly features offered by this software. […]

Beginner’s Guide: Graphite

By John Cirelly on May 15, 2024

Graphite is a comprehensive monitoring tool that may be used in either straightforward or intricate settings. It is possible to utilize it for the monitoring of a wide variety of networked systems, such as websites, applications, services, and servers in both on-premises and cloud-based settings. This variety of options is useful for businesses that fall […]

Dameware Remote Everywhere vs LogMeIn (GoTo) Rescue

By John Cirelly on February 1, 2024

It is normal practice for IT Help Desks and customer support teams to make use of remote assistance technology to provide end users with access to their personal computers or mobile devices. These tools give technicians the ability to resolve problems remotely as quickly as possible without requiring the support agent or end user to […]

Dameware Remote Everywhere vs BeyondTrust

By John Cirelly on February 1, 2024

BeyondTrust protects all privileged identities, access, and endpoints across your entire IT environment from potential security risks, while simultaneously delivering an exceptional user experience and improving operational efficiencies. BeyondTrust solutions are simple to implement, maintain, and grow by the changing needs of organizations thanks to the company’s long history of technological innovation and its unwavering […]

Dameware Remote Everywhere vs TeamViewer for Business

By John Cirelly on January 24, 2024

Since it is not unusual for employees of a business to have around-the-clock access to its information technology resources, remote assistance technologies play an important part in today’s global workplace. When it comes to ensuring that your day-to-day operations are not hampered by IT performance difficulties, having protocols for technical support that are both quick […]

The Best Cassandra Monitoring Tools [Tested]

By John Cirelly on January 17, 2024

A distributed NoSQL database management system called Cassandra is built to handle enormous amounts of organized and unstructured data across several commodity computers. For modern applications, it is an open-source database management system that offers high availability, fault tolerance, and scalability. The peer-to-peer paradigm, which is the foundation of Cassandra’s architecture, distributes data among a […]

The Best PostgreSQL Monitoring Tools

By John Cirelly on August 17, 2022

PostgreSQL is becoming one of the most popular relational databases. You can see this by looking at its growth on DBengine or in the most recent survey of developers on StackOverflow. It is a popular open-source, and as with any other data storage solution, capturing metrics is crucial for making sure your database is reliable […]

The Best Ransomware Files Decryptors

By John Cirelly on August 17, 2022

When ransomware infects a computer, it will encrypt or lock sensitive user data such as bank account information, financial statements, and other similar files. They achieve this by utilizing a powerful encryption technique. They are now requesting payment from the owner to provide him with the decryption tool or process. Here is our list of […]

The Best Ransomware Scanners

By John Cirelly on August 17, 2022

The setting of your operating system has a significant impact on the ransomware protection system that is going to be the most effective for you. For instance, you need to make sure that the ransomware scanner is compatible with the operating systems that you are using on your websites, and that it can communicate with […]