Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 - Advanced

In this session, we will dive into the advanced usage of Zaraz. We will cover how you can use Zaraz to run data transformation/enrichment on the Edge using Workers Variables. Additionally, we will discuss the HTTP request tool and how you can use it for ETL/monitoring/marketing automation. Lastly, we will cover Zaraz's HTTP Events API, which lets you send data to Zaraz from any potential source over HTTP.

9 - Testing & Debugging

In this session, we will dive into the advanced usage of Zaraz. We will cover how you can use Zaraz to run data transformation/enrichment on the Edge using Workers Variables. Additionally, we will discuss the HTTP request tool and how you can use it for ETL/monitoring/marketing automation. Lastly, we will cover Zaraz's HTTP Events API, which lets you send data to Zaraz from any potential source over HTTP.

Rethink Connected

Scaling your network to meet the demands of your growing business requires infrastructure that is up to the task. This can include multiple points of presence to deliver cloud-based solutions, and integration with your back-end systems. All of this requires thoughtful incorporation to maximize performance and built-in security to make sure your data is protected, no matter where it lives.