Resources
AppGate Resources
On-Demand Webinar
DtSR Episode 257 - Software Ate the Perimeter
Raf had a chance to sit down across the microphone from Jason Garbis of Cryptzone to talk about a the software defined perimeter.
WatchOn-Demand Webinar
Secure Your Hybrid IT Environment
Learn how to eliminate operational and technical complexity while achieving strong access control across hybrid infrastructures.
On-Demand Webinar
How VPNs and Firewalls Put Your Organization’s Security and Compliance at Risk
Traditional VPNs and firewalls are dangerous to your organization. Learn where they fail.
WatchOn-Demand Webinar
Why a Modern Approach to Securing SAP is essential to Reduced Risks
Two-thirds of SAP platforms have been breached. Learn how to protect on-premises and cloud-based SAP systems.
WatchShort Video
Leo Taddeo - CNBC WannaCry Ransomware
Cyxtera's Chief Information Security Officer, Leo Taddeo, talks to CNBC about the WannaCry ransomware attacks.
WatchDatasheet
AppGate for SAP
AppGate cloaks SAP environments from all unauthorized users – reducing the attack surface. Read the datasheet.
DownloadCase Study
Security Regulatory Organization
Read how one securities regulatory organization used Cryptzone to secure its AWS migration.
DownloadOn-Demand Webinar
SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access
Learn how the Software-Defined Perimeter provides capabilities to protect against today's IT security threats.
WatcheBook
How to Overcome NAC Limitations
Why a Software-Defined Perimeter delivers better network security for today’s enterprises
VieweBook
Operational Complexity: The Biggest SecurityThreat to Your AWS Environment
Remove operational complexity from achieving secure – and easily auditable – user access to your AWS systems.
ViewOn-Demand Webinar
Simplified Network Security across Physical, Virtual and Cloud-Based Systems
Unify and simplify secure access across hybrid systems with a Software-Defined Perimeter.
WatchDatasheet
AppGate Datasheet
AppGate enables organizations to adopt a Software-Defined Perimeter. Read the datasheet.
DownloadWhitepaper
Securing the Shifting Network Perimeter with Cryptzone AppGate
ESG’s five “…must-have requirements of a Software Defined Perimeter for today’s and tomorrow’s compute environments.”
DownloadDatasheet
SDP - Identity-Based Security for Hybrid Environments
Ensure only authorized users can connect to physical, virtual and cloud-based resources.
DownloadDatasheet
AppGate for AWS
AppGate stops attackers from accessing valuable network resources at multiple levels, with a unique Zero Trust security model
DownloadWhitepaper
Meeting PCI DSS Controls Using AppGate
PCI DSS Version 3.2 made compliance even more demanding. AppGate addresses some of these compliance challenges.
DownloadDatasheet
Privileged User Access
A Context Aware, Secure Access Gateway to Connect Privileged Users to Applications, Servers and Infrastructure.
DownloadDatasheet
Third Party Access
Mitigate the damage potential of third party-related breaches.
DownloadDatasheet
Infrastructure as a Service (IaaS)
AppGate provides layered defenses for managing IaaS user access that is easy to deploy.
DownloadWhitepaper
How to Plan for the EU GDPR
Important information GDPR rules and tips on how to prepare your organization to become compliant before May 2018.
DownloadOn-Demand Webinar
How to be an Effective CISO: Lessons Learned from two Experts
Improve your CISO effectiveness. Listen to Mark Arnold at Optiv, Inc. and Leo Taddeo CSO for Cyxtera discuss.
WatchOn-Demand Webinar
AWS Security – Simplify, Scale, & Secure User Access
Simplify the process of securing AWS user access for your employees, contractors and third-parties.
WatchWhitepaper
AppGate Performance and Scaling
Understand how to size an AppGate environment to meet your performance requirements.
DownloadOn-Demand Webinar
Reducing PCI Scope and Effort with a Software-Defined Perimeter
SageNet with AppGate helped a 600+ location convenience store chain improve security and reduce PCI audit scope.
WatchShort Video
AppGate for AWS
Meeting the AWS Security Challenge. Find out how AppGate for AWS can help you.
WatchOn-Demand Webinar
Network Access Control vs. Software-Defined Perimeter – or both?
Learn why leading companies are rapidly adopting a Software-Defined Perimeter instead of a traditional NAC security.
WatchCase Study
SageNet Reduces PCI Scope and Effort with AppGate
Read the case study on how SageNet improved access controls for secure, multi-tenant managed PCI network.
DownloadShort Video
Leo Taddeo Interview at Black Hat - Dark Reading News Desk
Leo Taddeo, CSO of Cyxtera, interview at Black Hat 2016.
WatchWhitepaper
Managing the Risks of Third-Party Access
Change your security practices to better secure access and limit damage from bad actors.
DownloadInfographic
BMC IPMI Dark Matters
Companies focus on securing resources from inside and outside threats. But dark matter is a problem often forgotten.
DownloadInfographic
Simplify AWS Security with a User-Centric Approach
Controlling AWS access with static IP addresses doesn’t scale. Learn why an identity-centric approach is needed.
DownloadCase Study
North American Government Agency Secures Access to 20,000 Network Resources
Read how AppGate delivered a secure access, encrypted solution that is centrally managed.
DownloadOn-Demand Webinar
From CNBC to You - Leo Taddeo Podcast
Cyxtera CSO, Ledo Taddeo, features in a CNBC podcast on the state of cybercrime.
WatchWhitepaper
Securing User Access to Enterprise Systems in Private or Public Clouds
See how AppGate addresses the dynamic nature of the cloud to keep network resources secure.
DownloadOn-Demand Webinar
Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS
Watch how AppGate SDP enables business and technical agility – DevOps – in IaaS environments.
WatchShort Video
MS Ignite 2016 - Paul Campaniello Interview
Paul Campaniello, CMO of Cryptzone, is interviewed at MS Ignite 2016 by David Kaufman
WatchOn-Demand Webinar
Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag
Identify the limitations of existing security solutions and how implementing 'Zero Trust' overcomes these.
WatchWhitepaper
After the Perimeter: How a ‘Segment of One’ Simplifies and Improves Security
Read about a new approach to network access based on a segment of one that can simplify and improve your security.
DownloadWhitepaper
4 Cornerstones to Securing Payment Card Data
Read a best-practice approach to securing payment card data with AppGate.
DownloadInfographic
AppGate’s context aware, dynamic approach to secure access
AppGate SDP makes the application/server infrastructure effectively “invisible.” See how.
DownloadCase Study
PSE S.A.
See how AppGate secured network access for PSE S.A. the transmission system operator for Poland.
DownloadDatasheet
MindTerm Datasheet
MindTerm is a powerful and easy to use access client that implements the SSH1 and SSH2 protocols. Get the datasheet.
DownloadCase Study
Redcats
Redcats controlled user access of its network with AppGate. Read the case study.
DownloadCase Study
Asprea
Learn how AppGate kept Asprea working when much of the UK was at a standstill due to sever weather.
DownloadCase Study
Aintree University Hospitals (NHS)
AppGate provided a cost effective remote access solution with strong authentication for this NHS Trust.
Download