Blog for


popular topics:

network security cloud security SASE Cloud Adoption reporting zero-trust virtual desktop infrastructure (VDI) secure Internet backhaul internet access speed GDPR compliance plan agent Zero Trust Network Access Ransomware packet capture on-prem web proxy appliances cloud connector network perimeter Microsoft Cloud App Security (MCAS) YouTube subscription Switching to iboss executive order cyber hygiene CASB SD-WAN REvil MDM Security Information and Event Management (SIEM) Kayesa Redirect GRE Next Generation User Interface Google Classroom Be Cyber Smart hackers Microsoft 365 logs PAC script Colonial Pipeline Data security Block YouTube HD objects next-gen cloud admin console Always-on VPN civil cyber fraud dashboard UI Remote Browser Isolation Apache Log4j GeoZone country block OneDrive Exact Data Match Internet Security risk dashboard EA Sports cloud-based web security dedicated IP Faster page loads Chromebook FedRAMP cloud-hosted Microsoft partnership event viewer NIST Apple TLS Restricted Mode JBS Remote device security Microsoft Azure primitives Lockdown mode vulnerabilities GUI RBI Log4Shell 9.8.27 block block Defenders Azure Secured Virtual Hubs cloud connected Data Breach security layers WCCP Instant Search ChromeOS timeframe ISO standards iOS Apple SSL Allow List Healthcare Secured Virtual Hubs rules DLP user interface Safari Cybersecurity Awareness Month Threat Landscape malware file uploads block Google Drive Network Behavior iboss platform version inventory migration to the cloud Tunneling Autosuggestion keyword filter ATARC callout iPad reverse proxy ZTNA Knowledgebase override HIMSS Cloud Access Security Broker Microsoft Virtual Hubs conditions Wessex Water Data Loss Prevention IPSec UX cybersecurity awareness Cyber Threats Reports crisis management FireEye Cloud count SIEM log tuning admin console Android Cybersecurity scheduling reports throttle video API CASB Containerization Knowledge base block pages block Dropbox Cloud App Isolation VirtualHubs Rapid deployment
Cover image
May 16, 2019
Empower Trusted Users to Override Website Blocks
How do you empower trusted network users to override website blocks independently? Consider these scenarios: A user unexpectedly...
override block pages
Cover image
May 13, 2019
Remove YouTube Comments, Route Users to Your YouTube Channel, and Bypass Restrictions for Individual Videos
Do these YouTube experiences look familiar? You visit YouTube to locate a specific video, only to be...
YouTube Restricted Mode Allow List Redirect
Cover Image - User Risk Dashboard
May 9, 2019
How to Identify High-Risk User Activity and Instantly Generate a Detailed Report
Do these stories look familiar? You receive an urgent request for a report that details the recent...
risk dashboard reporting
Cover image
May 9, 2019
Redirect or Modify User Network Traffic Automatically by Creating Custom Rules
No two networks are exactly alike. This means that you must occasionally find workarounds for challenges and...
Redirect objects primitives rules conditions