Andrew Froehlich President, West Gate Networks Networking How to set up backup internet connections for home offices 18 Nov 2022 Networking IPv4 vs. IPv6: What's the difference? 09 Nov 2022 Unified Communications How to combat voice security issues in collaboration platforms 19 Oct 2022 Customer Experience Top 4 CRM systems comparison 12 Oct 2022 Security Perimeter security vs. zero trust: It's time to make the move 07 Oct 2022 WhatIs filter (computing) 06 Oct 2022 Networking How to build a zero-trust network in 4 steps 04 Oct 2022 Security Top zero-trust use cases in the enterprise 04 Oct 2022 Networking 4 tips for network capacity planning and provisioning 03 Oct 2022 Unified Communications Asynchronous work best practices require strong policies 30 Sep 2022 Security The 5 principles of zero-trust security 29 Sep 2022 Networking What is a cloud-native network function (CNF)? 29 Sep 2022 Security Why zero trust requires microsegmentation 28 Sep 2022 Security Compare zero trust vs. the principle of least privilege 28 Sep 2022 WhatIs Lisp (programming language) 27 Sep 2022 Networking New data center demands reshape enterprise app delivery 26 Aug 2022 Unified Communications Why organizations need to revisit end-user device policies 19 Aug 2022 Security Compare SAST vs. DAST vs. SCA for DevSecOps 10 Aug 2022 Unified Communications Virtual whiteboard vs. ideation system: Which is best for you? 08 Aug 2022 Networking Next-gen network management difficult without AIOps 02 Aug 2022 Security How to prevent a data breach: 10 best practices and tactics 28 Jul 2022 Security How to secure data at rest, in use and in motion 28 Jul 2022 Security data breach 27 Jul 2022 Security insider threat 22 Jul 2022 Security Pen testing vs. vulnerability scanning: What’s the difference? 15 Jul 2022 Networking Marketing hype fuels AI predictive network troubleshooting 12 Jul 2022 Unified Communications How end-to-end encryption supports secure team collaboration 11 Jul 2022 Networking A guide to distributed network architectures 06 Jul 2022 Networking An introduction to neutral host networks using private 5G 28 Jun 2022 Networking How to convert binary to decimal 28 Jun 2022 Networking virtual network functions (VNFs) 21 Jun 2022 Networking network functions virtualization (NFV) 17 Jun 2022 Customer Experience What's the difference between SCM and CRM? 09 Jun 2022 Content Management What IT skills are required for e-commerce? 08 Jun 2022 Security 8 benefits of DevSecOps automation 07 Jun 2022 Networking 5 network virtualization challenges and how to solve them 03 Jun 2022 Networking Network virtualization benefits in the LAN, WAN and data center 16 May 2022 Unified Communications Why a distributed cloud architecture could be a boon for UC 12 May 2022 Security Zero trust vs. zero-knowledge proof: What's the difference? 12 May 2022 Networking 6 types of network topologies 05 May 2022 Networking Common types of enterprise network connections 27 Apr 2022 Security What are the benefits and challenges of microsegmentation? 25 Apr 2022 Security Comparing network segmentation vs. microsegmentation 21 Apr 2022 Unified Communications 3 ways to retool UC platform security architecture models 11 Apr 2022 Networking OSGi (Open Service Gateway Initiative) 08 Apr 2022 Security AAA server (authentication, authorization and accounting) 06 Apr 2022 Networking application layer 22 Mar 2022 Networking Compare 8 network automation tools 17 Mar 2022 Networking location-based service (LBS) 15 Mar 2022 Networking Explore 4 network performance monitoring tools 14 Mar 2022 Networking How does a NetOps strategy affect enterprise network teams? 14 Mar 2022 Security Use microsegmentation to mitigate lateral attacks 10 Mar 2022 Networking network automation 09 Mar 2022 Networking Business benefits of an Agile networking approach 03 Mar 2022 Security passphrase 25 Feb 2022 Networking Load sharing vs. load balancing: What's the difference? 23 Feb 2022 Networking Why NetOps is a bridge to AIOps 17 Feb 2022 Unified Communications UCaaS and CCaaS unite as organizations embrace the cloud 10 Feb 2022 Networking Point-to-Point Protocol (PPP) 01 Feb 2022 Security one-time pad 27 Jan 2022 Networking Integrating zero-trust practices into private 5G networks 26 Jan 2022 Unified Communications The evolving role of email in business communication 20 Jan 2022 Security Introduction to automated penetration testing 20 Jan 2022 Unified Communications How secure is Zoom video conferencing? 19 Jan 2022 Security elliptical curve cryptography (ECC) 04 Jan 2022 Security ciphertext feedback (CFB) 30 Dec 2021 Security white hat hacker 29 Dec 2021 Security registration authority (RA) 28 Dec 2021 Networking What are the different types of network switches? 22 Dec 2021 Networking Reverse Address Resolution Protocol (RARP) 15 Dec 2021 Security 4 API authentication methods to better protect data in transit 14 Dec 2021 WhatIs whitelist (allowlist) 09 Dec 2021 Unified Communications Integration strategy key to fuel cross-company collaboration 07 Dec 2021 Networking MDI/MDIX (medium-dependent interface/MDI crossover) 07 Dec 2021 Networking Automation, cloud lead as influential data center trends 02 Dec 2021 Unified Communications How do you apply a zero-trust security policy to UC? 30 Nov 2021 Security walled garden 30 Nov 2021 Security snooping 22 Nov 2021 Networking University's private cellular network hints to enterprise use 18 Nov 2021 Networking patch panel 16 Nov 2021 Security payload (computing) 25 Oct 2021 Networking Network redundancy vs. resiliency: What's the difference? 25 Oct 2021 Unified Communications What are the use cases for programmable video? 22 Oct 2021 Networking 4 categories of network monitoring 12 Oct 2021 Networking virtual network adapter 11 Oct 2021 Networking network analyzer (protocol analyzer or packet analyzer) 11 Oct 2021 Security How to evaluate and deploy an XDR platform 07 Oct 2021 Networking Class of Service (CoS) 04 Oct 2021 Networking frequency-shift keying (FSK) 01 Oct 2021 Unified Communications How to integrate your phone system with Microsoft Teams 29 Sep 2021 Networking bottleneck 28 Sep 2021 Networking CDN vs. cloud computing: What's the difference? 28 Sep 2021 Networking GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) 10 Sep 2021 Networking serial digital interface (SDI) 07 Sep 2021 Networking How remote work changes the future of network management 01 Sep 2021 Networking carrier-to-noise ratio 12 Aug 2021 Networking star network 10 Aug 2021 Networking Network observability vs. monitoring: What's the difference? 04 Aug 2021 Unified Communications What to consider before buying video conferencing technology 28 Jul 2021 Security Use a decentralized identity framework to reduce enterprise risk 27 Jul 2021 1 2 3 4