Resource Library

White Papers

White Papers


Does your Citrix or Terminal Server environment have an Achilles heel?

This white paper will highlight the information security risks inherent in all multi-user virtual desktop solutions, and offer a better way to secure access using a 'zero trust' security methodology.

Download "Does your Citrix or Terminal Server environment have an Achilles heel?"

Preventing Cyber Attacks with a Layered Network Security Model

This white paper looks at the IT landscape today and why traditional models are failing. It also explores how a layered defense, built on the principles of Zero Trust, can be used to combat cyber attacks involving privileged user accounts and enable organizations to regain control over their networks and mitigate risk.

Download "Preventing Cyber Attacks with a Layered Network Security Model"

Addressing Auditors Compliance Requirements with Secure Access

Regulatory compliance is a critical concern for many organizations. However, implementing the proper security controls and demonstrating compliance places a considerable burden on system administrators and can become very costly. Compliance with regulations, such as SOX, FISMA, PCI, FSA and SCC has always been challenging, but is especially difficult when adherence to multiple regulations is required.

Download "Addressing Auditors Compliance Requirements with Secure Access"

Why Recognition, not Identity should underpin Access Permissions

This short white paper introduces the concept of recognition, where identity becomes, only one dynamic attribute amongst many, used to determine user authenticity and grant access permissions, in order to minimize IT security exposure in line with risk based policies.

Download "Why Recognition, not Identity should underpin Access Permissions"

Plugging the Gaps in SharePoint Security

The recent scandal around a contractor at the NSA who used his access to Microsoft SharePoint® to obtain sensitive data and leak it to the world, and allegations of large-scale industry espionage from China have highlighted the dangers of an insecure SharePoint architecture. This white paper explores practical ways to increase SharePoint security in order to protect sensitive information and other valuable digital assets.

Download "Plugging the Gaps in SharePoint Security"

Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies

This study, conducted amongst attendees at Microsoft’s SharePoint Conference in Las Vegas (USA) found that at least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information, to which they are not entitled. Read the survey for more findings and SharePoint security recommendations.

Download "Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies"

Security Guides


Secured eCollaboration for SharePoint Security Guide

This security guide presents an overview of an effective approach to SharePoint security, which provides document encryption, enhanced access control and audit reporting capabilities. It reviews the functionality of Cryptzone's Secured eCollaboration solution, its capabilities for protecting content stored in and shared from SharePoint, and highlights the system's conceptual design.

Read the Secured eCollaboration for SharePoint Security Guide Security Guide

PCI DSS v3 Compliance Security Guide

This document summarises the twelve Payment Card Industry (PCI) Data Security Standard (DSS) Requirements and Security Assessment Procedures, and highlights some of the new updates in Version 3.0. The context is however limited to many areas in which the use of Cryptzone’s AppGate Server can deliver compliance against the standard.

Read the PCI DSS v3 Compliance Security Guide Security Guide