Andrew Froehlich President, West Gate Networks Search Unified Communications Hot desking vs. hoteling: What's the difference? 21 Nov 2022 Search Customer Experience How to choose a customer data platform 18 Nov 2022 Search Unified Communications How to approach a Webex-Teams integration and make it work 18 Nov 2022 Search Networking How to set up backup internet connections for home offices 18 Nov 2022 Search Networking IPv4 vs. IPv6: What's the difference? 09 Nov 2022 Search Unified Communications How to combat voice security issues in collaboration platforms 19 Oct 2022 Search Customer Experience Top 4 CRM systems comparison 12 Oct 2022 Search Security Perimeter security vs. zero trust: It's time to make the move 07 Oct 2022 WhatIs filter (computing) 06 Oct 2022 Search Networking How to build a zero-trust network in 4 steps 04 Oct 2022 Search Security Top zero-trust use cases in the enterprise 04 Oct 2022 Search Networking 4 tips for network capacity planning and provisioning 03 Oct 2022 Search Unified Communications Asynchronous work best practices require strong policies 30 Sep 2022 Search Security The 5 principles of zero-trust security 29 Sep 2022 Search Networking What is a cloud-native network function (CNF)? 29 Sep 2022 Search Security Why zero trust requires microsegmentation 28 Sep 2022 Search Security Compare zero trust vs. the principle of least privilege 28 Sep 2022 WhatIs Lisp (programming language) 27 Sep 2022 Search Networking New data center demands reshape enterprise app delivery 26 Aug 2022 Search Unified Communications Why organizations need to revisit end-user device policies 19 Aug 2022 Search Security Compare SAST vs. DAST vs. SCA for DevSecOps 10 Aug 2022 Search Unified Communications Virtual whiteboard vs. ideation system: Which is best for you? 08 Aug 2022 Search Networking Next-gen network management difficult without AIOps 02 Aug 2022 Search Security How to prevent a data breach: 10 best practices and tactics 28 Jul 2022 Search Security How to secure data at rest, in use and in motion 28 Jul 2022 Search Security data breach 27 Jul 2022 Search Security insider threat 22 Jul 2022 Search Security Pen testing vs. vulnerability scanning: What’s the difference? 15 Jul 2022 Search Networking Marketing hype fuels AI predictive network troubleshooting 12 Jul 2022 Search Unified Communications How end-to-end encryption supports secure team collaboration 11 Jul 2022 Search Networking A guide to distributed network architectures 06 Jul 2022 Search Networking An introduction to neutral host networks using private 5G 28 Jun 2022 Search Networking How to convert binary to decimal 28 Jun 2022 Search Networking virtual network functions (VNFs) 21 Jun 2022 Search Networking network functions virtualization (NFV) 17 Jun 2022 Search Customer Experience What's the difference between SCM and CRM? 09 Jun 2022 Search Content Management What IT skills are required for e-commerce? 08 Jun 2022 Search Security 8 benefits of DevSecOps automation 07 Jun 2022 Search Networking 5 network virtualization challenges and how to solve them 03 Jun 2022 Search Networking Network virtualization benefits in the LAN, WAN and data center 16 May 2022 Search Unified Communications Why a distributed cloud architecture could be a boon for UC 12 May 2022 Search Security Zero trust vs. zero-knowledge proof: What's the difference? 12 May 2022 Search Networking 6 types of network topologies 05 May 2022 Search Networking Common types of enterprise network connections 27 Apr 2022 Search Security What are the benefits and challenges of microsegmentation? 25 Apr 2022 Search Security Comparing network segmentation vs. microsegmentation 21 Apr 2022 Search Unified Communications 3 ways to retool UC platform security architecture models 11 Apr 2022 Search Networking OSGi (Open Service Gateway Initiative) 08 Apr 2022 Search Security AAA server (authentication, authorization and accounting) 06 Apr 2022 Search Networking application layer 22 Mar 2022 Search Networking Compare 8 network automation tools 17 Mar 2022 Search Networking location-based service (LBS) 15 Mar 2022 Search Networking How does a NetOps strategy affect enterprise network teams? 14 Mar 2022 Search Networking Explore 4 network performance monitoring tools 14 Mar 2022 Search Security Use microsegmentation to mitigate lateral attacks 10 Mar 2022 Search Networking network automation 09 Mar 2022 Search Networking Business benefits of an Agile networking approach 03 Mar 2022 Search Security passphrase 25 Feb 2022 Search Networking Load sharing vs. load balancing: What's the difference? 23 Feb 2022 Search Networking Why NetOps is a bridge to AIOps 17 Feb 2022 Search Unified Communications UCaaS and CCaaS unite as organizations embrace the cloud 10 Feb 2022 Search Networking Point-to-Point Protocol (PPP) 01 Feb 2022 Search Security one-time pad 27 Jan 2022 Search Networking Integrating zero-trust practices into private 5G networks 26 Jan 2022 Search Unified Communications The evolving role of email in business communication 20 Jan 2022 Search Security Introduction to automated penetration testing 20 Jan 2022 Search Unified Communications How secure is Zoom video conferencing? 19 Jan 2022 Search Security elliptical curve cryptography (ECC) 04 Jan 2022 Search Security ciphertext feedback (CFB) 30 Dec 2021 Search Security white hat hacker 29 Dec 2021 Search Security registration authority (RA) 28 Dec 2021 Search Networking What are the different types of network switches? 22 Dec 2021 Search Networking Reverse Address Resolution Protocol (RARP) 15 Dec 2021 Search Security 4 API authentication methods to better protect data in transit 14 Dec 2021 WhatIs whitelist (allowlist) 09 Dec 2021 Search Unified Communications Integration strategy key to fuel cross-company collaboration 07 Dec 2021 Search Networking MDI/MDIX (medium-dependent interface/MDI crossover) 07 Dec 2021 Search Networking Automation, cloud lead as influential data center trends 02 Dec 2021 Search Unified Communications How do you apply a zero-trust security policy to UC? 30 Nov 2021 Search Security walled garden 30 Nov 2021 Search Security snooping 22 Nov 2021 Search Networking University's private cellular network hints to enterprise use 18 Nov 2021 Search Networking patch panel 16 Nov 2021 Search Security payload (computing) 25 Oct 2021 Search Networking Network redundancy vs. resiliency: What's the difference? 25 Oct 2021 Search Unified Communications What are the use cases for programmable video? 22 Oct 2021 Search Networking 4 categories of network monitoring 12 Oct 2021 Search Networking virtual network adapter 11 Oct 2021 Search Networking network analyzer (protocol analyzer or packet analyzer) 11 Oct 2021 Search Security How to evaluate and deploy an XDR platform 07 Oct 2021 Search Networking Class of Service (CoS) 04 Oct 2021 Search Networking frequency-shift keying (FSK) 01 Oct 2021 Search Unified Communications How to integrate your phone system with Microsoft Teams 29 Sep 2021 Search Networking bottleneck 28 Sep 2021 Search Networking CDN vs. cloud computing: What's the difference? 28 Sep 2021 Search Networking GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) 10 Sep 2021 Search Networking serial digital interface (SDI) 07 Sep 2021 Search Networking How remote work changes the future of network management 01 Sep 2021 Search Networking carrier-to-noise ratio 12 Aug 2021 Search Networking star network 10 Aug 2021 1 2 3 4