Category | Topics |
---|---|
Get StartedThe Get Started category is designed to help you navigate the Zenith Community and teach you how to quickly leverage all the tools available.
|
7
|
ProgramsThe Programs category is designed to organize various programs that help support our customers, partners and community members.
|
0
|
Training and CertificationFind out about Zscaler training and certification offerings
|
83
|
EventsZenith Live, Regional User Groups & Events - Zenith Live is our yearly user conference, held in the US and EMEA. We host additional events such as Zscaler Academy and various user groups on a regular basis. Regional user groups and events occur regularly, check back for events happening in your area.
|
43
|
The Cloud-First ArchitectAs applications move to the cloud and users become increasingly mobile, the old ways of operating networks and security appliances is less and less effective. You must take a new approach to architecture, policy, and design.
|
104
|
PlatformThe Platform category will serve topics that do not fit directly into a sub-category. Things such as API access, logging, Zscaler NSS solution, analytics, Private Service Edge and Authentication topics that are not directly related to one of the product categories.
|
272
|
Secure Internet Access (ZIA)The Secure Internet Access (ZIA) category is the parent category for different capabilities within ZIA. Topics should be made in the corresponding sub-categories whenever possible. If there is not a sub-category that makes sense, or you are unclear, post in this top-level category.
|
82
|
389
|
|
11
|
|
0
|
|
5
|
|
1
|
|
DeceptionDeception is a proactive defense approach that detects active threats by injecting decoys (servers, apps, endpoints, fake files, fake users etc) that mimic production assets for the sole purpose of alerting you to adversary presence.
|
8
|