Resource Library

White Papers

White Papers


Does your Citrix or Terminal Server environment have an Achilles heel?

This white paper will highlight the information security risks inherent in all multi-user virtual desktop solutions, and offer a better way to secure access using a 'zero trust' security methodology.

Download "Does your Citrix or Terminal Server environment have an Achilles heel?"

Preventing Cyber Attacks with a Layered Network Security Model

This white paper looks at the IT landscape today and why traditional models are failing. It also explores how a layered defense, built on the principles of Zero Trust, can be used to combat cyber attacks involving privileged user accounts and enable organizations to regain control over their networks and mitigate risk.

Download "Preventing Cyber Attacks with a Layered Network Security Model"

Addressing Auditors Compliance Requirements with Secure Access

Regulatory compliance is a critical concern for many organizations. However, implementing the proper security controls and demonstrating compliance places a considerable burden on system administrators and can become very costly. Compliance with regulations, such as SOX, FISMA, PCI, FSA and SCC has always been challenging, but is especially difficult when adherence to multiple regulations is required.

Download "Addressing Auditors Compliance Requirements with Secure Access"

Why Recognition, not Identity should underpin Access Permissions

This short white paper introduces the concept of recognition, where identity becomes, only one dynamic attribute amongst many, used to determine user authenticity and grant access permissions, in order to minimize IT security exposure in line with risk based policies.

Download "Why Recognition, not Identity should underpin Access Permissions"

Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies

This study, conducted amongst attendees at Microsoft’s SharePoint Conference in Las Vegas (USA) found that at least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information, to which they are not entitled. Read the survey for more findings and SharePoint security recommendations.

Download "Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies"

Security Guides


PCI DSS v3 Compliance Security Guide

This document summarises the twelve Payment Card Industry (PCI) Data Security Standard (DSS) Requirements and Security Assessment Procedures, and highlights some of the new updates in Version 3.0. The context is however limited to many areas in which the use of Cryptzone’s AppGate Server can deliver compliance against the standard.

Read the PCI DSS v3 Compliance Security Guide Security Guide