<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pre-Sales on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/pre-sales/</link><description>Recent content in Pre-Sales on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/pre-sales/index.xml" rel="self" type="application/rss+xml"/><item><title>How to Whiteboard a Zero Trust Architecture in 10 Minutes</title><link>https://blog.it-learn.io/posts/2026-04-16-whiteboard-zero-trust-architecture-10-minutes/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-16-whiteboard-zero-trust-architecture-10-minutes/</guid><description>&lt;p&gt;There is a moment in every customer meeting where slides stop working. The CISO has seen a hundred vendor decks. The security architect is checking email during your presentation. The energy in the room is flat.&lt;/p&gt;
&lt;p&gt;Then you stand up, walk to the whiteboard, and start drawing.&lt;/p&gt;
&lt;p&gt;Everything changes. People put down their phones. They start asking questions. They point at the diagram and say &amp;ldquo;Wait, where does our VPN fit in that model?&amp;rdquo; Now you are having a conversation, not delivering a presentation.&lt;/p&gt;</description></item><item><title>MITRE ATT&amp;CK Framework Explained for Solutions Engineers</title><link>https://blog.it-learn.io/posts/2026-04-15-mitre-attack-framework-explained-for-solutions-engineers/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-15-mitre-attack-framework-explained-for-solutions-engineers/</guid><description>&lt;p&gt;Every Solutions Engineer in cybersecurity will eventually sit across from a customer who says some version of this: &amp;ldquo;Show me how your product maps to MITRE ATT&amp;amp;CK.&amp;rdquo; If you stumble through that moment, you lose credibility that is very hard to recover. If you handle it well, you establish yourself as someone who understands threats at a technical level — not just someone who demos software.&lt;/p&gt;
&lt;p&gt;MITRE ATT&amp;amp;CK has become the de facto common language between security vendors, SOC teams, threat intelligence analysts, and CISOs. It is referenced in RFPs, used in product evaluations, and increasingly required in compliance frameworks. As an SE, you do not need to be a threat researcher. But you do need to understand the framework well enough to use it naturally in conversation, map it to your product&amp;rsquo;s capabilities, and leverage it to differentiate your solution.&lt;/p&gt;</description></item><item><title>30 Skills Every Cybersecurity Solutions Engineer Needs</title><link>https://blog.it-learn.io/posts/2026-04-14-30-skills-every-solutions-engineer-needs/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-14-30-skills-every-solutions-engineer-needs/</guid><description>&lt;p&gt;The difference between a good Solutions Engineer and a great one is not just technical knowledge — it is knowing how to apply that knowledge in every phase of the sales cycle. From the first discovery call to the final architecture review, the best SEs combine deep technical credibility with the ability to translate complex security concepts into business outcomes.&lt;/p&gt;
&lt;p&gt;This series covers 30 essential skills across six categories. Each post is a practical guide you can apply immediately — in your next customer meeting, your next whiteboard session, or your next career move.&lt;/p&gt;</description></item></channel></rss>