News and Events

Press Releases

Cryptzone’s AppGate Named SC Magazine 2015 Excellence Award Finalist

January 20, 2015

AppGate makes short list in the Best Network Access Control Solution category

Cryptzone to Discuss How to Optimize PCI DSS Compliance Across the Supply Chain During PCI London

January 19, 2015

Cryptzone Announces AppGate Version 11.0, Adding Secure Access Control for Citrix and Windows Terminal Server

December 2, 2014

Latest version of AppGate, which dramatically reduces risk of unauthorized insider access, to be showcased at the Gartner Identity and Access Management Summit

Cryptzone Appoints Andy Jones as New Chief Financial Officer

October 27, 2014

Cryptzone, a global provider of data security and identity and access management (IAM) solutions, announced that Andy Jones has joined the company as chief financial officer. His primary responsibilities will include managing the company's financial growth, scaling continued operations and directing global human resources.

Cryptzone to discuss why recognition, rather than identity, should be foundation of access management at Cyber Security Expo

October 7, 2014

The IT security industry has become obsessed by proof of identify in a bid to combat growing cyber security threats. However recent high profile data breaches at organizations, such as Target and JP Morgan, have demonstrated that even organizations with a strong identity based security model are vulnerable to insider attacks, when a trusted identity is hijacked.

Cryptzone examines the role of context in identity and access management at it-sa Conference

October 6, 2014

This has been a bumper year for large scale data breaches, with compromised records in the millions. In a seminar at this week's it-sa Conference, at the Nuremburg Exhibition Centre, Germany, security expert Christian Doppelhofer - Regional Director DACH at Cryptzone, a global provider of data security and identity and access management (IAM) solutions, will explain why organizations need to look at a user's context, not just their identity, to prevent breaches.

Next Page