Resource Library

White Papers

White Papers


Addressing Auditors Compliance Requirements with Secure Access

Regulatory compliance is a critical concern for many organizations. However, implementing the proper security controls and demonstrating compliance places a considerable burden on system administrators and can become very costly. Compliance with regulations, such as SOX, FISMA, PCI, FSA and SCC has always been challenging, but is especially difficult when adherence to multiple regulations is required.

Download "Addressing Auditors Compliance Requirements with Secure Access"

Why Recognition, not Identity should underpin Access Permissions

This short white paper introduces the concept of recognition, where identity becomes, only one dynamic attribute amongst many, used to determine user authenticity and grant access permissions, in order to minimize IT security exposure in line with risk based policies.

Download "Why Recognition, not Identity should underpin Access Permissions"

Why Are So Many Mobile Device Management (MDM) Projects Failing?

When employee-owned devices began to proliferate in the workplace a few years ago, Mobile Device Management (MDM) was tipped one of IT security's most important new markets. Most recently, though, a Gartner analyst has said the filed "is going to die." This white paper explores why, as well as how more effective approaches to enterprise mobility – like protecting the data, not the device – could replace MDM.

Download "Why Are So Many Mobile Device Management (MDM) Projects Failing? "

Plugging the Gaps in SharePoint Security

The recent scandal around a contractor at the NSA who used his access to Microsoft SharePoint® to obtain sensitive data and leak it to the world, and allegations of large-scale industry espionage from China have highlighted the dangers of an insecure SharePoint architecture. This white paper explores practical ways to increase SharePoint security in order to protect sensitive information and other valuable digital assets.

Download "Plugging the Gaps in SharePoint Security"

Security Guides


PCI DSS V2 Compliance & AppGate Security Guide

This document describes the twelve requirements defined in the Payment Card Industry (PCI) Data Security Standard (DSS) Requirements and Security Assessment Procedures, Version 2.0 and how AppGate from Cryptzone can deliver many of these PCI DSS compliance requirements.

Read the PCI DSS V2 Compliance & AppGate Security Guide Security Guide

Secured eCollaboration for SharePoint Security Guide

This security guide presents an overview of an effective approach to SharePoint security, which provides document encryption, enhanced access control and audit reporting capabilities. It reviews the functionality of Cryptzone's Secured eCollaboration solution, its capabilities for protecting content stored in and shared from SharePoint, and highlights the system's conceptual design.

Read the Secured eCollaboration for SharePoint Security Guide Security Guide

PCI DSS v3 Compliance Security Guide

This document summarises the twelve Payment Card Industry (PCI) Data Security Standard (DSS) Requirements and Security Assessment Procedures, and highlights some of the new updates in Version 3.0. The context is however limited to many areas in which the use of Cryptzone’s AppGate Server can deliver compliance against the standard.

Read the PCI DSS v3 Compliance Security Guide Security Guide