For our premium content subscribers

Bill Bonney, Principal Consulting Analyst
Sorell Slaymaker, Principal Consulting Analyst

Sorell Slaymaker has 30 years of experience designing, building, securing, and operating IP networks and the communication services that run across them. His mission is to help make communication easier, cheaper and more secure since he believes that the more we communicate, the better we are. Prior to joining TechVision Research, Sorell was an Evangelist for 128 Technology which is a routing and security software company.  Prior to that, Sorell was a Gartner analyst covering enterprise networking, security, and communications.

show more

Sorell is an IT Architect with a focus on network, security, and communications architecture and he specializes in IT Architecture – Network Architecture, SIP Trunking, Contact Centers, Unified Communications, and Security Architecture.

At TechVision Research, Sorell is focusing on the following areas of specialty

  • IP Networking – Data Center, SD-WAN, Cloud Internetworking, WLAN, Internet
  • Unified Communications – Contact Center, Conferencing, Telephony, SIP Trunking
  • Enterprise Architecture – TOGAF, Zachman, Blueprint & Reference frameworks
  • Network Security – 802.1X, LDAP, VPN, Firewalls, IDS/IPS, Federation, Event Correlation

show less



  • IP Networking
  • Unified Communications
  • Enterprise Architecture
  • Network Security


  • Zero Trust Network Security
  • Contact Center Infrastructure
  • Unified Communications

Recently Published Research

Zero Trust Network Security
Legacy network security architectures operate on the outdated assumption that everything on the inside of an organization’s private network can be trusted.  With market trends of mobility and cloud plus the ever increasing security threats, enterprises can no longer trust anyone or anything.  Given the increased network attack surface, the speed and sophistication of attacks, and insider threats, a Zero Trust Networking (ZTN) architecture must be adopted.

ZTN is more than using an Identity and Access Management (IAM) to validate a user or device which is allowed onto a network.  ZTN is utilizing IAM to control where every user, device, application, and data are allowed to go on the network, starting at the very edge.

This research note examines all the compelling reasons why every organization must move to a ZTN architecture and the current best practices in adopting ZTN.  Since this market is at the early adopter stage, products are new and only offer point solutions for a specific part of the network; data center, WLAN, SD-WAN, VPN, MDM, cloud.

Upcoming Research



© 2019 All Rights Reserved

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.