Andrew Froehlich President, West Gate Networks Security Zero trust vs. defense in depth: What are the differences? 28 Sep 2022 WhatIs Lisp (programming language) 27 Sep 2022 Networking New data center demands reshape enterprise app delivery 26 Aug 2022 Unified Communications Why organizations need to revisit end-user device policies 19 Aug 2022 Security Compare SAST vs. DAST vs. SCA for DevSecOps 10 Aug 2022 Unified Communications Virtual whiteboard vs. ideation system: Which is best for you? 08 Aug 2022 Networking Next-gen network management difficult without AIOps 02 Aug 2022 Security How to prevent a data breach: 10 best practices and tactics 28 Jul 2022 Security How to secure data at rest, in use and in motion 28 Jul 2022 Security data breach 27 Jul 2022 Security insider threat 22 Jul 2022 Security Pen testing vs. vulnerability scanning: What’s the difference? 15 Jul 2022 Networking Marketing hype fuels AI predictive network troubleshooting 12 Jul 2022 Unified Communications How end-to-end encryption supports secure team collaboration 11 Jul 2022 Networking A guide to distributed network architectures 06 Jul 2022 Networking An introduction to neutral host networks using private 5G 28 Jun 2022 Networking How to convert binary to decimal 28 Jun 2022 Networking virtual network functions (VNFs) 21 Jun 2022 Networking network functions virtualization (NFV) 17 Jun 2022 Customer Experience What's the difference between SCM and CRM? 09 Jun 2022 Content Management What IT skills are required for e-commerce? 08 Jun 2022 Security 8 benefits of DevSecOps automation 07 Jun 2022 Networking 5 network virtualization challenges and how to solve them 03 Jun 2022 Customer Experience 7 reasons why businesses need mobile apps 25 May 2022 Networking Network virtualization benefits in the LAN, WAN and data center 16 May 2022 Unified Communications Why a distributed cloud architecture could be a boon for UC 12 May 2022 Security Zero trust vs. zero-knowledge proof: What's the difference? 12 May 2022 Networking 6 types of network topologies 05 May 2022 Networking Common types of enterprise network connections 27 Apr 2022 Security What are the benefits and challenges of microsegmentation? 25 Apr 2022 Security Comparing network segmentation vs. microsegmentation 21 Apr 2022 Unified Communications 3 ways to retool UC platform security architecture models 11 Apr 2022 Networking OSGi (Open Service Gateway Initiative) 08 Apr 2022 Security AAA server (authentication, authorization and accounting) 06 Apr 2022 Networking application layer 22 Mar 2022 Networking Compare 8 network automation tools 17 Mar 2022 Networking location-based service (LBS) 15 Mar 2022 Networking How does a NetOps strategy affect enterprise network teams? 14 Mar 2022 Networking Explore 4 network performance monitoring tools 14 Mar 2022 Security Use microsegmentation to mitigate lateral attacks 10 Mar 2022 Networking network automation 09 Mar 2022 Networking Business benefits of an Agile networking approach 03 Mar 2022 Security passphrase 25 Feb 2022 Networking Load sharing vs. load balancing: What's the difference? 23 Feb 2022 Networking Why NetOps is a bridge to AIOps 17 Feb 2022 Unified Communications UCaaS and CCaaS unite as organizations embrace the cloud 10 Feb 2022 Networking Point-to-Point Protocol (PPP) 01 Feb 2022 Security one-time pad 27 Jan 2022 Networking Integrating zero-trust practices into private 5G networks 26 Jan 2022 Unified Communications The evolving role of email in business communication 20 Jan 2022 Security Introduction to automated penetration testing 20 Jan 2022 Unified Communications How secure is Zoom video conferencing? 19 Jan 2022 Security elliptical curve cryptography (ECC) 04 Jan 2022 Security ciphertext feedback (CFB) 30 Dec 2021 Security white hat hacker 29 Dec 2021 Security registration authority (RA) 28 Dec 2021 Networking What are the different types of network switches? 22 Dec 2021 Networking Reverse Address Resolution Protocol (RARP) 15 Dec 2021 Security 4 API authentication methods to better protect data in transit 14 Dec 2021 Customer Experience How to train agents on call center fraud detection 09 Dec 2021 WhatIs whitelist (allowlist) 09 Dec 2021 Unified Communications Integration strategy key to fuel cross-company collaboration 07 Dec 2021 Networking MDI/MDIX (medium-dependent interface/MDI crossover) 07 Dec 2021 Networking Automation, cloud lead as influential data center trends 02 Dec 2021 Unified Communications How do you apply a zero-trust security policy to UC? 30 Nov 2021 Security walled garden 30 Nov 2021 Security snooping 22 Nov 2021 Networking University's private cellular network hints to enterprise use 18 Nov 2021 Networking patch panel 16 Nov 2021 Security payload (computing) 25 Oct 2021 Networking Network redundancy vs. resiliency: What's the difference? 25 Oct 2021 Unified Communications What are the use cases for programmable video? 22 Oct 2021 Networking 4 categories of network monitoring 12 Oct 2021 Networking virtual network adapter 11 Oct 2021 Networking network analyzer (protocol analyzer or packet analyzer) 11 Oct 2021 Security How to evaluate and deploy an XDR platform 07 Oct 2021 Networking Class of Service (CoS) 04 Oct 2021 Networking frequency-shift keying (FSK) 01 Oct 2021 Unified Communications How to integrate your phone system with Microsoft Teams 29 Sep 2021 Networking bottleneck 28 Sep 2021 Networking CDN vs. cloud computing: What's the difference? 28 Sep 2021 Networking GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) 10 Sep 2021 Networking serial digital interface (SDI) 07 Sep 2021 Networking How remote work changes the future of network management 01 Sep 2021 Networking carrier-to-noise ratio 12 Aug 2021 Networking star network 10 Aug 2021 Networking Network observability vs. monitoring: What's the difference? 04 Aug 2021 Unified Communications What to consider before buying video conferencing technology 28 Jul 2021 Security Use a decentralized identity framework to reduce enterprise risk 27 Jul 2021 Networking BGP vs. OSPF: When to use each protocol 23 Jul 2021 Networking passive optical network (PON) 20 Jul 2021 Security The top 7 identity and access management risks 19 Jul 2021 Networking What is the network edge and how is it different from edge computing? 15 Jul 2021 Networking The differences between PAP and CHAP 13 Jul 2021 Networking poison reverse 02 Jul 2021 Security Hybrid workforce model needs long-term security roadmap 25 Jun 2021 Security 10 identity and access management tools to protect networks 23 Jun 2021 Networking bus network 22 Jun 2021 Networking NetBIOS (Network Basic Input/Output System) 15 Jun 2021 Security Security observability vs. visibility and monitoring 03 Jun 2021 1 2 3 4