<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=7086586&amp;fmt=gif">
Skip to content
Kostenlose Beratung anfordern

Provide more details here.

Use text and images to tell your company’s story. Explain what makes your product or service extraordinary.

Phishing: Why Modern Security Solutions Are Essential

Phishing attacks are becoming increasingly sophisticated and dangerous. Find out why modern security solutions are essential for companies to protect themselves against these threats.
How IT Security Took the Lead in enabling Today's Business Digital Transformation Feature Image

How IT Security Took the Lead in enabling Today's Business Digital Transformation

We constantly hear about the need to embrace digital transformation—not just as a buzzword, but as a real opportunity for businesses to leverage their market position. By transforming workflows, processes, and the way we store and transfer data, companies can gain a significant competitive edge....

Mastering Agile and Innovative Project Management for Modern Businesses

Unlock the potential of your IT-Security projects with agile and innovative project management techniques, tailored for the dynamic environment of modern professional services.

In-house or outsourced? The best strategy for IT security

Buy or do it yourself?
Zscaler Privilege Remote Access and Browser Access vs a VDI solution Feature Image

Zscaler Privilege Remote Access and Browser Access vs a VDI solution

Organizations have to make well-informed decisions regarding secure remote access needs with quick-changing business scenarios. With the increase of remote work and the need to prevent cyberattacks, businesses are exploring various solutions to ensure their operations remain efficient and secure....

Understanding Supply Chain Attacks in the Context of NIS2

A brief overview into NIS2 supply chain requirements.
What is Zscaler? Feature Image

What is Zscaler?

If you are looking for a powerful solution for your cloud security, sooner or later you will come across the name Zscaler. But what is Zscaler? Generally speaking, it's a cloud-based security service that helps companies protect themselves against threats on the internet and manage their data...
Guide to the EU Cybersecurity Directive NIS2 (EU) 2022/2555 Feature Image

Guide to the EU Cybersecurity Directive NIS2 (EU) 2022/2555

The deadline is October 17, 2024 - are you ready? In a world increasingly reliant on digital infrastructures, cybersecurity is becoming more and more important at all levels of society. The new NIS2 Directive is an updated version of the EU's first cybersecurity directive, the 2016 NIS (Network and...
IT Security for Environmental Startups: Why It Matters Feature Image

IT Security for Environmental Startups: Why It Matters

You create a better world, we create a safer world.
NIS2 Directive: How Companies Can Secure Their Supply Chain Feature Image

NIS2 Directive: How Companies Can Secure Their Supply Chain

Introduction The NIS2 directive is becoming increasingly important, especially in light of the growing threat of supply chain attacks. Such attacks exploit vulnerabilities within an organization's supply chain - including third-party vendors or software updates - to compromise the ultimate target....
Sandboxing in IT Security: How Systems Isolate Malware Feature Image

Sandboxing in IT Security: How Systems Isolate Malware

At a time when cyberattacks are becoming increasingly sophisticated, it is crucial to detect malware before it is executed. This is where the concept of sandboxingcomes into play. But what is meant by a sandbox? And how can it significantly improve IT security in companies?
Why

Why "defense in depth" is not an option but a necessity in the IT environment

Cyber attacks rarely start with a loud bang - they usually begin harmlessly, e.g. with a seemingly legitimate email or a click on an inconspicuous website. Small and medium-sized companies are particularly vulnerable: limited resources, often incomplete security measures. This is exactly where ...
SASE vs. SSE – The Key Differences Explained Simply Feature Image

SASE vs. SSE – The Key Differences Explained Simply

The IT security landscape is changing rapidly. Companies today are faced with the question: do we need a complete network and security architecture such as SASE, or is the focused security solution SSE sufficient?Especially in times of remote work, cloud migration and increasing cyber threats,...
Threat Detection with AI: Detecting Attacks in Real Time Feature Image

Threat Detection with AI: Detecting Attacks in Real Time

Cyber attacks are not a question of if, but when. Modern attackers are combining increasingly sophisticated techniques - from ransomware and identity fraud to cloud-based attacks. This is where threat detection comes in, enabling companies to detect and contain attacks in real time. In this...
Zscaler EDM: Data Loss Prevention with Precise Data Detection Feature Image

Zscaler EDM: Data Loss Prevention with Precise Data Detection

Zscaler Data Loss Prevention: Exact Data Matching (EDM) for precise data protection
Cyber Risks: Strategies for Mitigating Risks Feature Image

Cyber Risks: Strategies for Mitigating Risks

some fiction
One Click, One Billion: The Top Cybersecurity Attacks of 2023 That Turned Everything Upside Down Feature Image

One Click, One Billion: The Top Cybersecurity Attacks of 2023 That Turned Everything Upside Down

The year 2023 marked a new peak in the ransomware wave, with paymentsexceeding a record 1 billion dollars, according to Chainalysis' annual report . However, this sum only refers to ransom payments. This is because the economic impact of lost productivity and repair costs associated with the...
Password Managers: How to Secure Your Passwords Effectively Feature Image

Password Managers: How to Secure Your Passwords Effectively

Public Key Infrastructure (PKI): Security Through Digital Trust Anchors Feature Image

Public Key Infrastructure (PKI): Security Through Digital Trust Anchors

In today's digital world, it is essential not only to store and transfer data, but also to protect it reliably. The so-called Public Key Infrastructure - PKI for short - plays a central role in this. But what is a PKI, how does it work and what advantages does it offer companies and organizations?
Social Engineering: Definition, Significance, and Protection Against Attacks Feature Image

Social Engineering: Definition, Significance, and Protection Against Attacks

What is social engineering? Social engineering refers to a method in which attackers attempt to manipulate people in a targeted manner in order to disclose sensitive information or carry out security-relevant actions. In contrast to traditional cyber attacks, which exploit technical...
Information security starts with risk management Feature Image

Information security starts with risk management

In a world where data is more valuable than oil, real IT security doesn't start with firewalls or virus scanners, but with a clear understanding of risks. If you don't know which threats are relevant to your company, you won't know how to prevent or control them. Therefore, information security...
Darknet 2025: How Cybercriminals Target Companies Feature Image

Darknet 2025: How Cybercriminals Target Companies

The so-called darknet is no longer a mysterious place that only tech nerds and conspiracy theorists talk about. By 2025 at the latest, it will have become a fully developed parallel market where cyber criminals trade, sell or target tools, information and access - often against companies. In this...
The Matrix is getting closer: Will AI replace humans? Feature Image

The Matrix is getting closer: Will AI replace humans?

AI is still in its infancy, albeit at an extremely fast pace of development. The first effects are already being felt: a massive reduction in the shortage of skilled workers on the IT market. I believe that AI will have a similar impact on world affairs as the Industrial Revolution once...
UniFi Network Application 9.5.21 Feature Image

UniFi Network Application 9.5.21

With version 9.5.21, Ubiquiti is continuing the gradual development of its network platform. The update focuses on stability, transparency and security mechanisms - less on new functions and more on structural maturity. This version is particularly relevant for organizations that rely...
UniFi Organization Manager at a Glance Feature Image

UniFi Organization Manager at a Glance

The UniFi Organization Manager is a new component within the UniFi ecosystem that was developed specifically for companies with distributed locations. For the first time, it makes it possible to manage multiple UniFi sites under a single organizational umbrella - including centralized...
UniFi Site Manager 5.X: Zero-Touch Provisioning for Ubiquiti SD-WAN Gateways Feature Image

UniFi Site Manager 5.X: Zero-Touch Provisioning for Ubiquiti SD-WAN Gateways

Companies that operate multiple sites (or are growing rapidly) know the pattern: The actual bottleneck is rarely the hardware - it is time, processes and the susceptibility to errors during rollout. This is exactly where UniFi Site Manager 5.0.0 comes in: With the new "UniFi Fabrics"...
Eliminate ongoing network costs with Ubiquiti Feature Image

Eliminate ongoing network costs with Ubiquiti

What if you could reduce your running costs for your network infrastructure to zero and at the same time halve your operating costs? Sounds too good to be true? But it is. Find out how in the following article. What it's all about Cost reduction through license-free SD-WAN, switches and...
Jumpcloud and CrowdStrike for Conditional Access Feature Image

Jumpcloud and CrowdStrike for Conditional Access

Conditional Access allows an IdP to bind authorization to more parameters than just a correct password and MFA. For example, it also takes into account device status and context. Jumpcloud now allows you to do this in conjunction with CrowdStrike. How this works and all the details below. ...
Why NAC is outdated technology Feature Image

Why NAC is outdated technology

NAC (Network Access Control) is expensive, complex and usually softened in dozens of places. For us at Rheintec, NAC is outdated technology that most companies no longer need, especially in the context of Zero Trust with SSE. History of NAC In - let's call them - "classic" network...
Using Jumpcloud as an IdP and MDM with M365 and Google Workspace Feature Image

Using Jumpcloud as an IdP and MDM with M365 and Google Workspace

SMEs need one thing above all: simple, secure and cost-effective architecture approaches so that IT becomes an enabler rather than a spoiler. At Rheintec, we deliver exactly that with architecture concepts that are unmatched in the market, with the goal of helping our customers lead the...
Zscaler Internet Access Service Status Monitoring With JumpCloud Feature Image

Zscaler Internet Access Service Status Monitoring With JumpCloud

This blog page focuses on Zscaler Internet Access(ZIA) service monitoring on the Client device and how to create alerting mechanism to inform Internal Security teams when the ZIA service disabled. The purpose behind this alerting to make sure to have visibility on the endpoint device and help to...
SASE with Zscaler, Ubiquiti, and Hetzner for SMEs Feature Image

SASE with Zscaler, Ubiquiti, and Hetzner for SMEs

SMEs need one thing above all: simple, secure and cost-effective architecture approaches so that IT and security become enablers rather than spoilsports. At Rheintec, we deliver exactly that with architecture concepts that are unparalleled on the market, with the aim of helping our customers...
UniFi Site Manager 5.0.0: Zero-Touch Provisioning for SD-WAN Gateways – Scale Faster, Standardize Cleanly Feature Image

UniFi Site Manager 5.0.0: Zero-Touch Provisioning for SD-WAN Gateways – Scale Faster, Standardize Cleanly

Companies that operate multiple sites (or are growing rapidly) know the pattern: The actual bottleneck is rarely the hardware - it is time, processes and the susceptibility to errors during rollout. This is exactly where UniFi Site Manager 5.0.0 comes in: With the new "UniFi Fabrics"...
UniFi 5G Max Feature Image

UniFi 5G Max

The UniFi 5G Max is the long-awaited 5G extender/router. Ubiquiti is positioning it as a powerful 5G modem for any UniFi installation, which is plugged into any UniFi switch via PoE and automatically registers as an additional WAN line in the network application. This closes a gap: locations...
UniFi Network Application 10.1.X Feature Image

UniFi Network Application 10.1.X

With version 10.1.X, UniFi is focusing even more strongly on the topic of reliability. In addition to many detailed improvements, the update brings a new high-availability page, finer control over VPNs, better logs and convenience features for Wi-Fi and hotspot operation. It will be...
UniFi Network Application 10.0.156 – New Version with great improvements Feature Image

UniFi Network Application 10.0.156 – New Version with great improvements

Version 10.0.123 of the UniFi Network Application primarily delivers consolidating changes with a clear focus: more automation, better usability, cleaner interfaces. For enterprise environments, this is more relevant than big show features because it strengthens standards, processes and...
BIMI: Additional Email-Trust Trust for B2C Companies Feature Image

BIMI: Additional Email-Trust Trust for B2C Companies

BIMI is still a little-known standard, although it has existed since 2019 and offers great added value for companies in the B2C sector.
How to configure a VPN Tunnel from Ubiquiti to Cloudflare Feature Image

How to configure a VPN Tunnel from Ubiquiti to Cloudflare

Problem: Many IoT/OT devices, servers and legacy systems do not support agents (e.g. Cloudflare WARP), or Cloudflare Magic WAN is used to ramp up locations.Solution: IPSec tunnels from UniFi gateways to Cloudflare via Magic WAN to centrally inspect and filter HTTP/HTTPS traffic - without an...
Setup VPN tunnels from Ubiquiti to Zscaler Feature Image

Setup VPN tunnels from Ubiquiti to Zscaler

Problem: Many IoT/OT devices, servers and legacy systems do not support agents (e.g. Zscaler Client Connector).Solution: IPSec tunnels from UniFi Gateways to Zscaler (ZIA) to centrally inspect and filter HTTP/HTTPS traffic - without an agent on the endpoint device.Added value: Unified SSE...
SSE: BYOD for SaaS with Identitiy Proxy Feature Image

SSE: BYOD for SaaS with Identitiy Proxy

With identity proxies, companies can implement the use case "secure SaaS access from BYOD devices". This means that instead of simply "bluntly blocking" access to SaaS applications using IdP functions such as Microsoft's Conditional Access if the user is coming from an unmanaged device, the...
SINEC: Siemens new Zero Trust Solution Feature Image

SINEC: Siemens new Zero Trust Solution

Siemens secretly presented a hot product at it-sa: a zero-trust network access solution for OT infrastructures.
Microsoft Teams Call Quality Monitoring with Zscaler ZDX Feature Image

Microsoft Teams Call Quality Monitoring with Zscaler ZDX

Why Call Quality Monitoring Matters for Microsoft Teams By 2030, over 75% of organizations will rely on UCaaS platforms for their calling, meeting, and messaging needs (source: Metrigy). As Microsoft Teams becomes the backbone of workplace communication, ensuring high-quality voice and video...

Regulations Are Changing Faster Than Our Compliance Strategy

How C-Level Leaders Can Stop Chasing and Start Shaping Their Compliance Posture

When Your Security Team Can’t Keep Up – What’s Your Plan B

Executives must prepare for ops fatigue — long before burnout breaks the system. Author: Rudolf von RohrEstimated read time: 4 minutes

How to Regain Control of Your Security Stack Before Vendors Own Your Roadmap

Avoid vendor sprawl and make strategic, future-proof decisions in a fast-moving market. Author: Rudolf von RohrEstimated read time: 5 minutes

We’re Spending Millions to Protect a Perimeter That No Longer Exists

Why legacy network models fail in cloud-first and hybrid work environments — and what to do about it. Author: Rudolf von RohrEstimated read time: 4 minutes

IT OPEX Is Climbing – But We’re Not Getting Faster or Safer

Why traditional scaling models are broken — and what lean security means today. Author: Rudolf von RohrEstimated read time: 4 minutes

Why best-in-class tools don't equal best-in-class security — and what to do about it.

Author: Rudolf von RohrEstimated read time: 4 minutes

Why Our Cybersecurity Budget Keeps Growing – But Risk Doesn’t Shrink

The disconnect between spend and outcomes — and what to do about it. Author: Rudolf von RohrEstimated read time: 4 minutes
CrowdStrike Cloud Security – Solving Key Challenges Feature Image

CrowdStrike Cloud Security – Solving Key Challenges

Introduction Cloud computing has become the operational backbone of modern business. Every new workload, API and identity migrated to the cloud accelerates innovation—yet each one also widens the attack surface. CrowdStrike Cloud Security delivers an end-to-end approach that merges complete...
The Advantage of Check Point Application Based Routing With a GRE Tunnel To Zscaler ZIA Feature Image

The Advantage of Check Point Application Based Routing With a GRE Tunnel To Zscaler ZIA

Discover the benefits of Check Point's Application Based Routing over traditional Policy Based Routing, especially when leveraging ZScaler ZIA GRE tunnels.
Save Costs with Zscaler Remote Browser Access Instead of VDI Feature Image

Save Costs with Zscaler Remote Browser Access Instead of VDI

Discover how Zscaler Zero Trust solutions can significantly reduce costs and complexity compared to traditional VDI infrastructure and why we think VDIs are strategically dead.
Optimize IT Spending with Infrastructure Benchmarking | Rheintec Feature Image

Optimize IT Spending with Infrastructure Benchmarking | Rheintec

In times of economic uncertainty, IT security benchmarking is becoming increasingly important for companies. In the face of the looming recession in Europe, businesses must maximize the efficiency of their IT infrastructure without compromising on security or productivity.
The Benefits of Zscaler Browser Isolation for Businesses Feature Image

The Benefits of Zscaler Browser Isolation for Businesses

Discover how Zscaler Browser Isolation can improve your business's security.
VPN vs. ZTNA - What are the differences? Feature Image

VPN vs. ZTNA - What are the differences?

VPNs (Virtual Private Networks) and ZTNA (Zero Trust Network Access) are two key technologies often compared against each other. While VPNs have long been the standard for secure remote access, ZTNA is increasingly gaining traction. In this article, we explore how both approaches function, their...
Maximizing ROI: Why Investing in Zero Trust Network Access (ZTNA) is Critical for Business Security Feature Image

Maximizing ROI: Why Investing in Zero Trust Network Access (ZTNA) is Critical for Business Security

The Rising Cost of Cyber Threats In today’s digital landscape, cyber threats are more sophisticated than ever, and businesses—especially SMEs—are prime targets. Data breaches, ransomware attacks, and phishing scams can lead to severe financial losses, operational downtime, and reputational...
Understanding SPF Record And Email Authentication And Security Feature Image

Understanding SPF Record And Email Authentication And Security

In a time where email security is a must, understanding SPF (Sender Policy Framework) is crucial for protecting your domain from spoofing and phishing attacks.
5 Key Guidelines to Secure Your Small Business Feature Image

5 Key Guidelines to Secure Your Small Business

Cybersecurity doesn’t have to be a daunting challenge for small business owners. By following these five simple steps, you’ll gain a basic understanding of how to protect your business. While these tips can’t guarantee complete protection from all cyberattacks, they’ll help you be more secure than...
Threat prevention comparisment Feature Image

Threat prevention comparisment

In today’s rapidly evolving threat landscape, CISOs and IT security leaders face an unprecedented volume of cyberattacks targeting operations, data integrity, and compliance mandates. As enterprises accelerate cloud adoption and hybrid workforces, the ability to proactively detect, mitigate, and...
Why We Chose Wiz as the CNAPP Solution for Our Customers Feature Image

Why We Chose Wiz as the CNAPP Solution for Our Customers

Discover why Wiz stands out as the top CNAPP solution for comprehensive cloud security, offering unmatched visibility, ease of management, and intelligent threat detection.
Keeper PAM: Prevent Cyberattacks & Data Breaches | Rheintec Feature Image

Keeper PAM: Prevent Cyberattacks & Data Breaches | Rheintec

In today's digital landscape, cyberattacks and data breaches are increasingly common. Businesses need robust security solutions to protect privileged accounts and sensitive data. Keeper PAM and Keeper Connection Manager offer comprehensive protection to keep your organization safe.
Integrate Check Point Logs into your SIEM Feature Image

Integrate Check Point Logs into your SIEM

Elevate your cybersecurity with Check Point Software Blades and SIEM integration, achieving unparalleled threat visibility and automated responses.
Strengthening Email Security in a Threat-Filled World Feature Image

Strengthening Email Security in a Threat-Filled World

In today's cyber threat landscape, securing email communication is a top priority for organizations. Discover how advanced email security measures can protect your business from devastating cyberattacks.
Feedback as a Key to Growth Feature Image

Feedback as a Key to Growth

Lena sits in her office, wondering how to tell her colleague Tom that his last presentation wasn’t optimal. She knows feedback is important – but how can she deliver it without demotivating him? We’ve all been in similar situations: feedback is everywhere, yet it often feels uncomfortable – whether...
A Culture Question Feature Image

A Culture Question

Breaking the fear of mistakes in IT Security: Embracing a new Culture, the Just Culture. The IT security industry struggles with a fear-driven culture, where professionals hesitate to report incidents due to blame, job loss, or legal consequences. This creates blind spots, reduces innovation, and...
Dynamic Access Management in Public Clouds with Check Point Feature Image

Dynamic Access Management in Public Clouds with Check Point

Find out how dynamic tag-based access management with Check Point can improve your cloud security while ensuring efficiency, scalability and robust firewalling.
DORA Act: Key Points and Implications for the financial sector Feature Image

DORA Act: Key Points and Implications for the financial sector

Understanding the DORA Act: A transformative regulation enhancing digital resilience across the financial sector.
The Importance of Implementing a proper DMARC Policy Feature Image

The Importance of Implementing a proper DMARC Policy

Ensuring your emails reach the inbox and not the spam folder is crucial for business success. Learn why implementing a proper DMARC policy is essential.
Effective AI Risk Management Strategies for Businesses Feature Image

Effective AI Risk Management Strategies for Businesses

Unlock the potential of AI while safeguarding your business with these essential risk management strategies

Zscaler SSE vs Microsoft Global Secure Access

As Microsoft steps into the SSE market, the question arises: "How Zscaler's and Microsoft's solution differ from each other?"  In this blog, we are going to compare Zscaler SSE against Microsoft's Global Secure Access to highlights their key features, strengths, and limitations.
SD-WAN vs SASE: Which is Right for Your Business? Feature Image

SD-WAN vs SASE: Which is Right for Your Business?

In the ever-evolving landscape of network security and connectivity, choosing between SD-WAN and SASE can be a game-changer for your business.

Securing Email Communications with Mimecast's Advanced Tools

Discover how Mimecast's advanced tools provide a robust shield for your email communications, ensuring the highest level of security and compliance in today's digital landscape.

How To Establish An Information Security Management System According To ISO27001:2022:  Quick Guide and Overview to ISO27001 Compliance

Building a robust Information Security Management System (ISMS) according to ISO27001:2022 is a critical step for businesses aiming to secure their data and meet compliance standards. Furthermore, ISO27001 Certification may act as an enabler to attract further business opportunities.

Cybersecurity Best Practices for NIS 2 Compliance

Stay ahead of evolving cybersecurity threats by understanding and implementing the NIS 2 Directive's comprehensive requirements.

Enhancing Zero Trust Network Access with Zscaler and CrowdStrike

In this blog post, we’ll explain how CrowdStrike and Zscaler work together to enhance security dynamically when accessing your most critical applications. 

Top Security Solutions for Small Business Owners

Comprehensive security solutions are essential for small businesses to safeguard against common cyber threats. This blog outlines the most effective strategies and tools, tailored to meet the needs of small business owners.

Overcoming Current DORA Challenges in IT Infrastructure

Navigating the complexities of DORA compliance is crucial for financial institutions aiming to maintain resilience and security in an increasingly digital world. Discover how leveraging advanced IT infrastructure solutions like SASE, RBAC, and XDR can help overcome these challenges effectively.
Why Managed Services Are Crucial for an SMB`s IT Resilience Feature Image

Why Managed Services Are Crucial for an SMB`s IT Resilience

Ensuring IT resilience is critical for SMBs in today's digital landscape. Discover why managed services offer a robust, cost-effective solution for enhancing productivity and security.

Cloud Network Management: Ubiquiti's Edge in the Enterprise Market

Ubiquiti's seamless transition from home networking to enterprise solutions sets a new standard in cloud network management and multivendor SASE in combination with Zscaler.
Cloud Data Protection with Zscaler and Rubrik Feature Image

Cloud Data Protection with Zscaler and Rubrik

Discover how financial institutions can leverage Zscaler and Rubrik to fortify their cloud data protection strategies against modern cyber threats.

SASE: The Future of Cost-Effective Cybersecurity Architecture

Discover how SASE architecture can revolutionize cybersecurity by offering a cost-effective, scalable, and secure solution for modern digital businesses.
Zscaler EDM: Data Loss Prevention with Precise Data Detection Feature Image

Zscaler EDM: Data Loss Prevention with Precise Data Detection

Zscaler Data Loss Prevention: Exact Data Matching (EDM) for precise data protection
Understanding SPF Record And Email Authentication And Security Feature Image

Understanding SPF Record And Email Authentication And Security

In a time where email security is a must, understanding SPF (Sender Policy Framework) is crucial for protecting your domain from spoofing and phishing attacks.
Strengthening Email Security in a Threat-Filled World Feature Image

Strengthening Email Security in a Threat-Filled World

In today's cyber threat landscape, securing email communication is a top priority for organizations. Discover how advanced email security measures can protect your business from devastating cyberattacks.
Cloud Data Protection with Zscaler and Rubrik Feature Image

Cloud Data Protection with Zscaler and Rubrik

Discover how financial institutions can leverage Zscaler and Rubrik to fortify their cloud data protection strategies against modern cyber threats.

Phishing: Why Modern Security Solutions Are Essential

Phishing attacks are becoming increasingly sophisticated and dangerous. Find out why modern security solutions are essential for companies to protect themselves against these threats.
Social Engineering: Definition, Significance, and Protection Against Attacks Feature Image

Social Engineering: Definition, Significance, and Protection Against Attacks

What is social engineering? Social engineering refers to a method in which attackers attempt to manipulate people in a targeted manner in order to disclose sensitive information or carry out security-relevant actions. In contrast to traditional cyber attacks, which exploit technical...
BIMI: Additional Email-Trust Trust for B2C Companies Feature Image

BIMI: Additional Email-Trust Trust for B2C Companies

BIMI is still a little-known standard, although it has existed since 2019 and offers great added value for companies in the B2C sector.
Understanding SPF Record And Email Authentication And Security Feature Image

Understanding SPF Record And Email Authentication And Security

In a time where email security is a must, understanding SPF (Sender Policy Framework) is crucial for protecting your domain from spoofing and phishing attacks.
Strengthening Email Security in a Threat-Filled World Feature Image

Strengthening Email Security in a Threat-Filled World

In today's cyber threat landscape, securing email communication is a top priority for organizations. Discover how advanced email security measures can protect your business from devastating cyberattacks.
The Importance of Implementing a proper DMARC Policy Feature Image

The Importance of Implementing a proper DMARC Policy

Ensuring your emails reach the inbox and not the spam folder is crucial for business success. Learn why implementing a proper DMARC policy is essential.

Securing Email Communications with Mimecast's Advanced Tools

Discover how Mimecast's advanced tools provide a robust shield for your email communications, ensuring the highest level of security and compliance in today's digital landscape.
Zscaler Privilege Remote Access and Browser Access vs a VDI solution Feature Image

Zscaler Privilege Remote Access and Browser Access vs a VDI solution

Organizations have to make well-informed decisions regarding secure remote access needs with quick-changing business scenarios. With the increase of remote work and the need to prevent cyberattacks, businesses are exploring various solutions to ensure their operations remain efficient and secure....
What is Zscaler? Feature Image

What is Zscaler?

If you are looking for a powerful solution for your cloud security, sooner or later you will come across the name Zscaler. But what is Zscaler? Generally speaking, it's a cloud-based security service that helps companies protect themselves against threats on the internet and manage their data...
Zscaler EDM: Data Loss Prevention with Precise Data Detection Feature Image

Zscaler EDM: Data Loss Prevention with Precise Data Detection

Zscaler Data Loss Prevention: Exact Data Matching (EDM) for precise data protection
Why NAC is outdated technology Feature Image

Why NAC is outdated technology

NAC (Network Access Control) is expensive, complex and usually softened in dozens of places. For us at Rheintec, NAC is outdated technology that most companies no longer need, especially in the context of Zero Trust with SSE. History of NAC In - let's call them - "classic" network...
Zscaler Internet Access Service Status Monitoring With JumpCloud Feature Image

Zscaler Internet Access Service Status Monitoring With JumpCloud

This blog page focuses on Zscaler Internet Access(ZIA) service monitoring on the Client device and how to create alerting mechanism to inform Internal Security teams when the ZIA service disabled. The purpose behind this alerting to make sure to have visibility on the endpoint device and help to...
SASE with Zscaler, Ubiquiti, and Hetzner for SMEs Feature Image

SASE with Zscaler, Ubiquiti, and Hetzner for SMEs

SMEs need one thing above all: simple, secure and cost-effective architecture approaches so that IT and security become enablers rather than spoilsports. At Rheintec, we deliver exactly that with architecture concepts that are unparalleled on the market, with the aim of helping our customers...
Setup VPN tunnels from Ubiquiti to Zscaler Feature Image

Setup VPN tunnels from Ubiquiti to Zscaler

Problem: Many IoT/OT devices, servers and legacy systems do not support agents (e.g. Zscaler Client Connector).Solution: IPSec tunnels from UniFi Gateways to Zscaler (ZIA) to centrally inspect and filter HTTP/HTTPS traffic - without an agent on the endpoint device.Added value: Unified SSE...
SSE: BYOD for SaaS with Identitiy Proxy Feature Image

SSE: BYOD for SaaS with Identitiy Proxy

With identity proxies, companies can implement the use case "secure SaaS access from BYOD devices". This means that instead of simply "bluntly blocking" access to SaaS applications using IdP functions such as Microsoft's Conditional Access if the user is coming from an unmanaged device, the...
Microsoft Teams Call Quality Monitoring with Zscaler ZDX Feature Image

Microsoft Teams Call Quality Monitoring with Zscaler ZDX

Why Call Quality Monitoring Matters for Microsoft Teams By 2030, over 75% of organizations will rely on UCaaS platforms for their calling, meeting, and messaging needs (source: Metrigy). As Microsoft Teams becomes the backbone of workplace communication, ensuring high-quality voice and video...
The Advantage of Check Point Application Based Routing With a GRE Tunnel To Zscaler ZIA Feature Image

The Advantage of Check Point Application Based Routing With a GRE Tunnel To Zscaler ZIA

Discover the benefits of Check Point's Application Based Routing over traditional Policy Based Routing, especially when leveraging ZScaler ZIA GRE tunnels.
Save Costs with Zscaler Remote Browser Access Instead of VDI Feature Image

Save Costs with Zscaler Remote Browser Access Instead of VDI

Discover how Zscaler Zero Trust solutions can significantly reduce costs and complexity compared to traditional VDI infrastructure and why we think VDIs are strategically dead.
The Benefits of Zscaler Browser Isolation for Businesses Feature Image

The Benefits of Zscaler Browser Isolation for Businesses

Discover how Zscaler Browser Isolation can improve your business's security.
Threat prevention comparisment Feature Image

Threat prevention comparisment

In today’s rapidly evolving threat landscape, CISOs and IT security leaders face an unprecedented volume of cyberattacks targeting operations, data integrity, and compliance mandates. As enterprises accelerate cloud adoption and hybrid workforces, the ability to proactively detect, mitigate, and...

Zscaler SSE vs Microsoft Global Secure Access

As Microsoft steps into the SSE market, the question arises: "How Zscaler's and Microsoft's solution differ from each other?"  In this blog, we are going to compare Zscaler SSE against Microsoft's Global Secure Access to highlights their key features, strengths, and limitations.

Enhancing Zero Trust Network Access with Zscaler and CrowdStrike

In this blog post, we’ll explain how CrowdStrike and Zscaler work together to enhance security dynamically when accessing your most critical applications. 
Cloud Data Protection with Zscaler and Rubrik Feature Image

Cloud Data Protection with Zscaler and Rubrik

Discover how financial institutions can leverage Zscaler and Rubrik to fortify their cloud data protection strategies against modern cyber threats.