What are the core features and architectural elements of Check Point Harmony Email & Collaboration?
A quick walk-through of HEC.
A quick walk-through of HEC.
A brief intro to a big topic.
A quick exploration of risk management.
A walkthrough of various DLP techniques.
A quick explanation of popular casing styles.
Unpacking the deployment methodology for ZPA.
A helpful technique for extracting contents from minimal containers.
Simple principles for optimizing connectivity to M365.
Let's discuss the thought process for defining and implementing bandwidth control in Zscaler.
Clarifying the differences between a couple similar terms.
How do we know that file type is REALLY that file type?
How picky can we be with Zscaler cloud app control?
cyber-101
Understanding the ingredients for risk...
cyber-101
A brief walk-through of the recommended phases to rollout TLS inspection.
coding-101
A very brief intro to comparing these AI systems.
cyber-101
How can Zscaler client connector tell it's on a trusted network?
cyber-101
Sequential steps and thought process for deploying the Zscaler client connector app.
cyber-101
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
cyber-101
Defining agility of change updates on ZCC.
cyber-101
Exploring features and functionality for the client connector
cyber-101
A quick explanation of this FAZ feature
cyber-101
CLI commands for troubleshooting comm issues in FAZ.
cyber-101
Clarifying some terminology for FAZ
cyber-101
What logs can actually be sent to FAZ?