Tom King is an Information Security Engineer and Junior SOC Analyst. He works with Expert Insights’ product testing team to conduct independent technical reviews of cybersecurity solutions and services across a range of software categories, including threat detection and response, email security, identity and access management, and network protection. He also analyzes market landscapes, product features, and industry trends to support the content team in delivering insightful recommendations for cybersecurity buyers. Tom holds a First-Class Honours Degree in Cybersecurity from Sheffield Hallam University, where he specialized in cybersecurity forensics, counterterrorism, and incident response.
How to choose the right User Authentication software.
How to choose the right Single Sign-On software.
How to choose the right network observability solution.
How to choose the right Unified Endpoint Management software.
How to choose the right mobile device management software.
How to choose the right email archiving solution.
How to choose the right Data Loss Prevention solution.
How to choose the right cloud security solution.
How to choose the right DAST software.
How to choose the right container security solution.
How to choose the right CNAPP.
How to choose the right SAST software.
How to choose the right application security solution.
How to choose the right API security solution.
How to choose the right API Gateway software.
How to choose the right DMARC solution.
How to choose the right SIEM software.
How to choose the right Endpoint Detection and Response software.
How to choose the right Microsoft 365 backup and recovery solution.
How to choose the right GRC solution.
How to choose the right phishing simulation and testing solution.
How to choose the right virtual desktop infrastructure solution.
How to choose the right vulnerability management software for your unique business needs. Assess the key features you should look out for.
How to choose the right Privileged Access Management software.
How to choose the right Dark Web Monitoring software.
How to choose the right IAM software.
How to choose the right SOAR software.
How to choose the right CIAM solution.
A guide to the Intrusion Prevention Systems (IPS) market.
How to choose the right endpoint security software.
How to choose the right Attack Surface Management solution.
How to choose the right KYC solution.