File1, 2, & 3 for estrack:


INFO300

File1:

Firewalls put up a barrier between your trusted internal network and
untrusted outside networks, such as the internet. They use a set of
defined rules to allow or block traffic. A firewall can be hardware,
software, or both.

File2:

Cybercriminals are increasingly targeting mobile devices and apps. Within
the next three years, 90 percent of IT organizations may support
corporate applications on personal mobile devices. Of course, you need
to control which devices can access your network.

File3:

Email gateways are the number one threat vector for a security
breach. Attackers use personal information and social engineering
tactics to build sophisticated phishing campaigns to deceive recipients
and send them to sites serving up malware. An email security application
blocks incoming attacks and controls outbound messages to prevent
the loss of sensitive data.

No lines are longer than 80 characters, TYVM. Other specified properties aren't being scored automatically at this time so this is not necessarily good news...