Ericom Education Center

What is?

The Ericom Knowledge Center
Watering Hole Attack  
How are they carried out, and how can they be prevented?

What is malvertising? How do malvertising attacks occur, and how can you protect against them?

Web Application Isolation  
What is web application isolation? How does it work? How does it provide protection for both applications and their users?

Drive-By Attack  
What is a drive-by attack? How can drive-by attacks be detected and prevented?

Browser Exploit  
What is a browser exploit and what does it do? How can users protect themselves from browser exploits?

Application Isolation and Zero Trust Network Access  
What is Application Isolation? What is Zero Trust Network Access?

What is NGFW?

What is CASB?

Secure Web Gateway  
What is Secure Web Gateway?

What is Lateral-Movement?

What is Micro-Segmentation?

Zero Trust  
What is Zero Trust?

Browser Isolation  
What is Remote Browser Isolation?

Virtual Browser  
What a virtual browser is, how it works and what it is used for.

What is Kerberos? What Kerberos does, and its benefits.

Content Disarm and Reconstruction (CDR)  
What CDR means, what it does, and why it is important.

Layered Security  
What layered security entails, why it is important, and the three types of controls it includes.

A simple explanation of what HTML5 is, and an overview what’s new in HTML5.

What does RDP stand for? Learn what RDP does, and how it is used.

What does VDI stand for? Learn more about what VDI does, and the problems it addresses.

What does BYOD stand for? Learn what a BYOD policy involves and read up on the advantages of BYOD.

Disaster Recovery  
What is Disaster Recovery? Find out what to include in a disaster recovery plan and how it can help your organization achieve business continuity.

1:1 Computing  
What is 1:1 computing? Learn what 1:1 computing is, is used for and how it can help students and teachers in the learning process.

What is Chromebook? Read our introduction to key Chromebook features main features, including how they support the use of cloud technology.