Andrew Froehlich President, West Gate Networks Search Networking Network observability vs. monitoring: What's the difference? 04 Aug 2021 Search Unified Communications What to consider before buying video conferencing technology 28 Jul 2021 Search Security Use a decentralized identity framework to reduce enterprise risk 27 Jul 2021 Search Networking BGP vs. OSPF: When to use each protocol 23 Jul 2021 Search Networking passive optical network (PON) 20 Jul 2021 Search Networking What is the network edge and how is it different from edge computing? 15 Jul 2021 Search Networking The differences between PAP and CHAP 13 Jul 2021 Search Networking poison reverse 02 Jul 2021 Search Security Hybrid workforce model needs long-term security roadmap 25 Jun 2021 Search Networking bus network 22 Jun 2021 Search Networking NetBIOS (Network Basic Input/Output System) 15 Jun 2021 Search Security Security observability vs. visibility and monitoring 03 Jun 2021 Search Unified Communications What is the difference between audio and video conferencing? 03 Jun 2021 Search Networking 5 steps to achieve network infrastructure modernization 02 Jun 2021 Search Unified Communications What is the difference between Zoom and Zoom Rooms? 02 Jun 2021 Search Networking bandwidth (network bandwidth) 24 May 2021 Search Security Enterprises mull 5G vs. Wi-Fi security with private networks 14 May 2021 Search Networking Network capacity planning best practices for return to office 20 Apr 2021 Search Networking What does a network infrastructure upgrade project involve? 15 Apr 2021 Search Networking Network layer 13 Apr 2021 Search Security Transport Layer Security (TLS) 12 Apr 2021 Search Unified Communications External collaboration tools extend platforms to partners 05 Apr 2021 Search Networking How are network operations center responsibilities changing? 02 Apr 2021 Search Unified Communications Microsoft Teams vs. Slack: Which is better for your business? 26 Mar 2021 Search Unified Communications Companies eye CPaaS, RCS business messaging to expand reach 16 Mar 2021 Search Security Endpoint security vs. network security: Why both matter 15 Mar 2021 Search Unified Communications What are the benefits of vendor-agnostic UC hardware? 09 Mar 2021 Search Networking OSI model (Open Systems Interconnection) 26 Feb 2021 Search Networking How to build a private 5G business case 22 Feb 2021 Search Unified Communications The pros and cons of custom home collaboration devices 11 Feb 2021 Search Networking SASE hype includes SD-WAN, but does it need to? 02 Feb 2021 Search Networking VLAN vs. subnet: What's the difference? 20 Jan 2021 Search Networking Broadband vs. Wi-Fi: What's the difference? 12 Jan 2021 Search Unified Communications What does 'bring your own carrier' mean for UCaaS platforms? 11 Jan 2021 Search Security 6 remote workforce cybersecurity strategies for 2021 16 Dec 2020 Search Security Key SOC metrics and KPIs: How to define and use them 09 Dec 2020 Search Networking What's the role of narrowband IoT in 5G networks? 01 Dec 2020 Search Unified Communications How has Twilio SIP trunking disrupted the market? 23 Nov 2020 Search Security What are the biggest hardware security threats? 20 Nov 2020 Search Networking How do VPN vs. cloud services compare for remote work? 11 Nov 2020 Search Unified Communications How do NG911 standards make the technology superior to E911? 04 Nov 2020 Search Unified Communications Enterprises mull software-based business phone alternatives 26 Oct 2020 Search Unified Communications What's the difference between UC-certified and MS-certified? 14 Oct 2020 Search Unified Communications What's the difference between social media and social networking? 24 Sep 2020 Search Security Combination of new, old tech driving remote access security 10 Sep 2020 Search Networking LoRa vs. 5G: Can they coexist for IoT network connectivity? 01 Sep 2020 Search Unified Communications Why remote work needs mobile unified communications 24 Aug 2020 Search Unified Communications What does it mean if a device is UC-certified? 18 Aug 2020 Search Customer Experience How to collect customer data to improve overall retail CX 14 Aug 2020 Search Networking 8 network diagramming tools for architects 07 Aug 2020 Search Customer Experience Key strategies to build and monitor customer loyalty and trust 03 Aug 2020 Search Security As network security analysis proves invaluable, NDR market shifts 29 Jul 2020 Search Security To face modern threats, using AI for cybersecurity a necessity 15 Jul 2020 Search Networking How to secure a home network for remote workforces 15 Jul 2020 Search Networking What are the risks of third-party VPN services? 10 Jul 2020 Search Networking What's the difference between a Layer 3 switch and a router? 01 Jul 2020 Search Unified Communications Will remote work spur unified communications interoperability? 26 Jun 2020 Search Cloud Computing Multi-cloud security strategies rely on visibility, uniformity 24 Jun 2020 Search Security 6 key identity and access management benefits 16 Jun 2020 Search Security How to protect workloads using a zero-trust security model 15 Jun 2020 Search Unified Communications Microsoft Teams vs. Zoom: Can Teams replace Zoom? 19 May 2020 Search Networking How to build a network monitoring business case 18 May 2020 Search Customer Experience 6 key benefits of headless commerce 13 May 2020 Search Customer Experience 4 ways CX is central to digital transformation in retail 12 May 2020 Search Networking Remote access best practices emphasize security, ease of use 06 May 2020 Search Security How can security benefit from cyberthreat intelligence? 05 May 2020 Search Networking What are the differences between VPN and VDI services? 04 May 2020 Search Unified Communications Legacy UC infrastructure issues hamstring remote work demand 15 Apr 2020 Search Security AI pen testing promises, delivers both speed and accuracy 07 Apr 2020 Search Networking Take a look at 6 top VPN service providers for remote work 06 Apr 2020 Search Security Using AIOps for cybersecurity and better threat response 06 Apr 2020 Search Security Answering the top IoT risk management questions 25 Mar 2020 Search Unified Communications What role do legacy UC devices play in a cloud migration? 17 Mar 2020 Search Networking Before deploying SD-WAN, assess your underlay network components 13 Mar 2020 Search Networking What are some of the weaknesses of SD-WAN? 12 Mar 2020 Search Security ITOps security requires attention to training 12 Mar 2020 Search Networking Can WPA2 be upgraded to WPA3? 11 Mar 2020 Search Networking What is the difference between LoRa and LoRaWAN? 04 Mar 2020 Search Networking What is network verification and do enterprises need it? 03 Mar 2020 Search Networking How does DevOps in networking change network requirements? 28 Feb 2020 Search Unified Communications UCaaS market verticals require custom platform features 21 Feb 2020 Search Networking Explore the top Wi-Fi 6 technology benefits and providers 13 Feb 2020 Search Security What are the most common digital authentication methods? 22 Jan 2020 Search Unified Communications 5 business benefits of unified communications in the cloud 21 Jan 2020 Search Security How effective are traditional authentication methods? 21 Jan 2020 Search Unified Communications Explore 6 SIP trunk providers with these comparison points 03 Jan 2020 Search Networking Why should I consider an AIOps platform for my network? 17 Dec 2019 Search Networking SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose? 16 Dec 2019 Search Networking How do I choose the right network automation tools or platform? 10 Dec 2019 Search Security How can companies identify IT infrastructure vulnerabilities? 09 Dec 2019 Search Security What are best practices for a modern threat management strategy? 05 Dec 2019 Search Security IT security threat management tools, services to combat new risks 05 Dec 2019 Search Security What is the role of CISO in network security? 26 Nov 2019 Search Security The network security tools to combat modern threats 25 Nov 2019 Search Security What are the top network security techniques for modern companies? 22 Nov 2019 Search Security Boost network security visibility with these 4 technologies 19 Nov 2019 Search Security Network visibility and monitoring tools now amp up security 19 Nov 2019 Search Security Is a cybersecurity insurance policy a worthy investment? 17 Oct 2019 Search Security How should I choose a cybersecurity insurance provider? 16 Oct 2019 Search Security What types of cybersecurity insurance coverage are available? 15 Oct 2019 1 2 3 4