Andrew Froehlich President, West Gate Networks Networking BGP vs. OSPF: When to use each protocol 23 Jul 2021 Networking passive optical network (PON) 20 Jul 2021 Security The top 7 identity and access management risks 19 Jul 2021 Networking What is the network edge and how is it different from edge computing? 15 Jul 2021 Networking The differences between PAP and CHAP 13 Jul 2021 Networking poison reverse 02 Jul 2021 Security Hybrid workforce model needs long-term security roadmap 25 Jun 2021 Security 10 identity and access management tools to protect networks 23 Jun 2021 Networking bus network 22 Jun 2021 Networking NetBIOS (Network Basic Input/Output System) 15 Jun 2021 Security Security observability vs. visibility and monitoring 03 Jun 2021 Unified Communications What is the difference between audio and video conferencing? 03 Jun 2021 Networking 5 steps to achieve network infrastructure modernization 02 Jun 2021 Unified Communications What is the difference between Zoom and Zoom Rooms? 02 Jun 2021 Networking bandwidth (network bandwidth) 24 May 2021 Security Enterprises mull 5G vs. Wi-Fi security with private networks 14 May 2021 Networking Network capacity planning best practices for return to office 20 Apr 2021 Networking What does a network infrastructure upgrade project involve? 15 Apr 2021 Networking Network layer 13 Apr 2021 Security Transport Layer Security (TLS) 12 Apr 2021 Unified Communications External collaboration tools extend platforms to partners 05 Apr 2021 Networking How are network operations center responsibilities changing? 02 Apr 2021 Unified Communications Microsoft Teams vs. Slack: Which is better for your business? 26 Mar 2021 Unified Communications Companies eye CPaaS, RCS business messaging to expand reach 16 Mar 2021 Security Endpoint security vs. network security: Why both matter 15 Mar 2021 Unified Communications What are the benefits of vendor-agnostic UC hardware? 09 Mar 2021 Networking OSI model (Open Systems Interconnection) 26 Feb 2021 Networking How to build a private 5G business case 22 Feb 2021 Unified Communications The pros and cons of custom home collaboration devices 11 Feb 2021 Networking SASE hype includes SD-WAN, but does it need to? 02 Feb 2021 Networking VLAN vs. subnet: What's the difference? 20 Jan 2021 Networking Broadband vs. Wi-Fi: What's the difference? 12 Jan 2021 Unified Communications What does 'bring your own carrier' mean for UCaaS platforms? 11 Jan 2021 Security 6 remote workforce cybersecurity strategies for 2021 16 Dec 2020 Security Key SOC metrics and KPIs: How to define and use them 09 Dec 2020 Networking What's the role of narrowband IoT in 5G networks? 01 Dec 2020 Unified Communications How has Twilio SIP trunking disrupted the market? 23 Nov 2020 Security What are the biggest hardware security threats? 20 Nov 2020 Networking How do VPN vs. cloud services compare for remote work? 11 Nov 2020 Unified Communications How do NG911 standards make the technology superior to E911? 04 Nov 2020 Unified Communications Enterprises mull software-based business phone alternatives 26 Oct 2020 Unified Communications What's the difference between UC-certified and MS-certified? 14 Oct 2020 Unified Communications What's the difference between social media and social networking? 24 Sep 2020 Security Combination of new, old tech driving remote access security 10 Sep 2020 Networking LoRa vs. 5G: Can they coexist for IoT network connectivity? 01 Sep 2020 Unified Communications Why remote work needs mobile unified communications 24 Aug 2020 Unified Communications What does it mean if a device is UC-certified? 18 Aug 2020 Customer Experience How to collect customer data to improve overall retail CX 14 Aug 2020 Networking 8 network diagramming tools for architects 07 Aug 2020 Customer Experience Key strategies to build and monitor customer loyalty and trust 03 Aug 2020 Security As network security analysis proves invaluable, NDR market shifts 29 Jul 2020 Security To face modern threats, using AI for cybersecurity a necessity 15 Jul 2020 Networking How to secure a home network for remote workforces 15 Jul 2020 Networking What are the risks of third-party VPN services? 10 Jul 2020 Networking What's the difference between a Layer 3 switch and a router? 01 Jul 2020 Unified Communications Will remote work spur unified communications interoperability? 26 Jun 2020 Security 6 key identity and access management benefits 16 Jun 2020 Security Identity management vs. authentication: Know the difference 16 Jun 2020 Security How to protect workloads using a zero-trust security model 15 Jun 2020 Unified Communications Microsoft Teams vs. Zoom: Can Teams replace Zoom? 19 May 2020 Networking How to build a network monitoring business case 18 May 2020 Customer Experience 6 key benefits of headless commerce 13 May 2020 Customer Experience 4 ways CX is central to digital transformation in retail 12 May 2020 Networking Remote access best practices emphasize security, ease of use 06 May 2020 Security How can security benefit from cyberthreat intelligence? 05 May 2020 Networking What are the differences between VPN and VDI services? 04 May 2020 Unified Communications Legacy UC infrastructure issues hamstring remote work demand 15 Apr 2020 Security AI pen testing promises, delivers both speed and accuracy 07 Apr 2020 Networking Take a look at 6 top VPN service providers for remote work 06 Apr 2020 Security Using AIOps for cybersecurity and better threat response 06 Apr 2020 Security Answering the top IoT risk management questions 25 Mar 2020 Unified Communications What role do legacy UC devices play in a cloud migration? 17 Mar 2020 Networking Before deploying SD-WAN, assess your underlay network components 13 Mar 2020 Networking What are some of the weaknesses of SD-WAN? 12 Mar 2020 Security ITOps security requires attention to training 12 Mar 2020 Networking Can WPA2 be upgraded to WPA3? 11 Mar 2020 Networking What is the difference between LoRa and LoRaWAN? 04 Mar 2020 Networking What is network verification and do enterprises need it? 03 Mar 2020 Networking How does DevOps in networking change network requirements? 28 Feb 2020 Unified Communications UCaaS market verticals require custom platform features 21 Feb 2020 Networking Explore the top Wi-Fi 6 technology benefits and providers 13 Feb 2020 Security What are the most common digital authentication methods? 22 Jan 2020 Unified Communications 5 business benefits of unified communications in the cloud 21 Jan 2020 Security How effective are traditional authentication methods? 21 Jan 2020 Unified Communications Explore 6 SIP trunk providers with these comparison points 03 Jan 2020 Networking Why should I consider an AIOps platform for my network? 17 Dec 2019 Networking SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose? 16 Dec 2019 Networking How do I choose the right network automation tools or platform? 10 Dec 2019 Security How can companies identify IT infrastructure vulnerabilities? 09 Dec 2019 Security What are best practices for a modern threat management strategy? 05 Dec 2019 Security IT security threat management tools, services to combat new risks 05 Dec 2019 Security What is the role of CISO in network security? 26 Nov 2019 Security The network security tools to combat modern threats 25 Nov 2019 Security What are the top network security techniques for modern companies? 22 Nov 2019 Security Boost network security visibility with these 4 technologies 19 Nov 2019 Security Network visibility and monitoring tools now amp up security 19 Nov 2019 Security Is a cybersecurity insurance policy a worthy investment? 17 Oct 2019 Security How should I choose a cybersecurity insurance provider? 16 Oct 2019 Security What types of cybersecurity insurance coverage are available? 15 Oct 2019 Networking How do I create proper documentation of network automation? 03 Oct 2019 1 2 3 4