Home Franklin Okeke Bio
Image of Franklin Okeke
Franklin Okeke

Franklin Okeke is a contributing writer to Enterprise Networking Planet, as well as an author and freelance content writer with over 5 years of experience covering cybersecurity, artificial intelligence, and emerging technologies. In addition to pursuing a Master's degree in Cybersecurity & Human Factors from Bournemouth University, Franklin is an entrepreneur with a passion for startups, innovation, and product development. His writing also appears regularly in TechRepublic, ServerWatch, and other leading technology publications.1

How to Implement Automated Patch Management in 5 Steps
Automated patch management saves security teams time and resources by not having to manually patch vulnerabilities. Learn how to implement it for your...
What Is Microsegmentation in Networking? Beginner’s Guide
Microsegmentation allows network administrators to place boundaries for individual machines to secure workloads independently. Learn how microsegmentation works...
How to Recover From a DDoS Attack in 4 Steps
Recover from a DDoS attack by rebooting systems, assessing damage, and fortifying weak spots to prevent future attacks. Here’s a quick guide to the steps to recover from...
7 Best SD-WAN Providers and Vendors in 2023
SD-WAN providers connect and manage data center services between local & remote locations. Review top providers...
4 SD-WAN Challenges and Issues (and How to Address Them)
Learn how to resolve top SD-WAN challenges and issues like connectivity, troubleshooting, and security, and select the right vendor to partner...
ZTNA vs. VPN: Know the Differences Before Switching
Curious about switching from a VPN to ZTNA? Gain clarity on these secure networking technologies as we break down their features and highlight the key...
8 Best Network Monitoring Tools & Software for 2023 Compared
Discover the best network monitoring tools of 2023 that offer real-time insights, automated alerts, and comprehensive reporting for effective network...
8 Best Zero Trust Security Solutions and Software in 2023
Explore the best zero trust security solutions to fortify your defense against cyberattacks. Learn about identity verification, continuous monitoring, and adaptive access...
How to Secure Your Network in 6 Simple Steps
Need to make sure your network is secure? Follow these steps to protect your data and devices from cyber...
How to Set Up a Firewall: 5 Steps to Firewall Configuration
Protect your computer and data from hackers and malicious software with the help of a firewall. Here's a step-by-step guide to setting up a...