Resource Library

Webinars & Videos

For upcoming live webinars please visit our Events Page.


Does your Citrix or Terminal Server environment have an Achilles heel?

Citrix and Microsoft Windows Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. In this webinar we will discuss a new approach to controlling and securing access from Citrix/Terminal Servers into the trusted network.

View the On-Demand webinar

Does your Citrix or Terminal Server environment have an Achilles heel? Webinar

Recognition rather than Identity as the foundation for access management

The IT security industry has become obsessed by proof of identify in a bid to combat growing cyber security threats. However recent high profile data breaches at organizations, such as Target and JP Morgan, have demonstrated that even organizations with a strong identity based security model are vulnerable to insider attacks, when a trusted identity is hijacked.

This presentation introduces the concept of recognition, where identity becomes, only one dynamic attribute amongst many, used to determine user authenticity and grant access permissions, in order to minimize IT security exposure in line with risk based policies.

Recognition rather than Identity as the foundation for access management Webinar

So You Think SharePoint Is Secure?

Organizations implement Microsoft SharePoint to improve knowledge sharing and boost collaboration, which in many cases include confidential and commercially sensitive information. However the results of a recent survey sponsored by Cryptzone, reveal that a sizable majority disregard security measures and opt to share information illicitly with unauthorized third parties. This presentation will briefly share the key findings of the survey undertaken at a SharePoint conference. It will go on to explore two security approaches to increase SharePoint security: - 3 Dimensional Permissions: User and context based encryption of any document type held within SharePoint. Documents remain 'controlled' outside the SharePoint environment for secure collaboration. - Context Aware Access: Limiting the amount of access to internal SharePoint servers based on a user's context and the device used.

So You Think SharePoint Is Secure? Webinar

USB Encryption & Full Lifecycle Management

This is your chance to learn about USB Life Cycle Management through birth (deployment), life (usage monitoring) & death (loss prevention). Find simple ways to take the burden off your IT administrators by giving them tools to improve IT security, while maintaining worker productivity. See this recorded webinar to: - Discover how you can reduce risks of flash drive usage - Improve DLP efforts without overburdening your IT department - See a live demonstration of the key Secured eUSB features that secure data: - Forced encryption of flash drives; - Lock out & Kill Pill command to wipe lost or stolen flash drives; - Extended reporting to track data transfers and content changes.

USB Encryption & Full Lifecycle Management Webinar

Protect PII and Sensitive Information - Collaborative Access of Encrypted Files/Folders

This webinar discusses how to secure sensitive information when it is "at rest" and wherever it's stored within your Enterprise - network share drives, desktops, laptops, USB flash drive, even CD and DVDs. Learn how Cryptzone's Enterprise Protection Method (EPM) eliminates the need for digital signatures and provides a fool-proof method of authentication and key management. Listen to security experts explore how Secured eFile centrally controls user behavior to minimize accidental breaches of sensitive and confidential information. See how the integrated encryption platform reduces the IT administrative burden by providing tools that improve security and worker productivity.

Protect PII and Sensitive Information - Collaborative Access of Encrypted Files/Folders Webinar

Short Videos

Kill Pill for SEP Secured eUSB

If a user has lost or misplaced a USB flash drive IT can issue a 'lockout' command to block access to the device - administrators can unlock the device if required. If a secured USB drive is stolen or an employee leaves the company without returning their USB flash drives, the "Kill Pill" command will completely wipe the flash drive clean to ensure complete data protection. This will even work over the Internet.

Kill Pill for SEP Secured eUSB Webinar

Enforce Encryption of Flash Drives

For most organizations it's important to ensure that all data that is saved to USB flash drives are encrypted. With the Secured eUSB solution it is possible to set up so users will be enforced to encrypt flash drives to be able to store information on them. For example, IT can set up a device policy to allow end users to be able to plug in any USB flash drive and read data. However, in order to write data to the drive, the user must encrypt and secure the drive beforehand. This policy will ensure that end users can read data from private flash drives and customer flash drives but to be able to store data to a flash drive it must be encrypted with the Secured eUSB technology. The solution also offer the possibility to block out so USB flash drives cannot be used at all.

Enforce Encryption of Flash Drives Webinar

Open Secured eMail

With Secured eMail the recipient can open the encrypted email on almost any platform or email service including PC, Mac, iPhone, iPad, Blackberry, Android phones, Windows Mobile phones, Linux, all types of webmail like Gmail, Hotmail, Outlook OWA. The only requirement is an internet browser and an internet connection.

Open Secured eMail Webinar

Encrypt an Email

Secured eMail integrates into Microsoft Outlook and Lotus Notes so that users can use the email client as usual. To secure the contents of an email and send a secured message, the user simply presses the "Send Secured" button. The secured content is delivered as an attachment wrapped in an ordinary email. The "wrap-mail" provides plain text instructions to the recipient about what they need to do to read the secured contents.

Encrypt an Email Webinar