Reducing PCI Scope and Effort with a Software-Defined Perimeter
Learn how SageNet, a managed services provider managing 160,000+ customer locations, helped a convenience store chain with 600+ locations improve security and reduce PCI audit scope by more than 50% using Cryptzone’s AppGate.
EU GDPR - Worldwide IT Compliance & Security Implications
Starting May 2018, any company managing data about EU citizens can be fined up to 4% of global company revenues if found to be non-compliant with the EU’s new General Data Protection Regulation (GDPR).
SharePoint Migration – Securing data on premises, online and anywhere in between
SharePoint Online and Office 365 migration projects can be complicated, often because of information security concerns. So, how can you simplify and accelerate the process by applying security and privacy policies early in the transition?
This podcast features a lively Q&A session with Leo Taddeo, Cryptzone’s CSO and former FBI Agent in Charge of the Special Operations/Cyber Division of the New York office. The discussion ranged from the state of cybercrime to discussing the benefits of a software-defined perimeter approach to network access, and more!
Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security
This Webinar will give information on traditional access control solutions typically provide all-or-nothing network access, which has led to the security gaps behind many of today’s headline-making breaches.
Cryptzone recently released a new product, AppGate XDP, which closes this gap through dynamic, attribute-based controls that determine access across cloud, virtual and physical infrastructures.
Cryptzone IT-Harvest Interview with Richard Stiennon
Cryptzone sits down with IT-Harvest's Richard Stiennon to talk about rapidly evolving cyber threats and how AppGate’s context aware, dynamic approach to secure access can protect your organization against today’s advanced cyberattacks.
Reining in Sites and Permissions in SharePoint with Site Sheriff
Every year, the volume of enterprise content in SharePoint grows. Now, more than ever, organization are also using SharePoint for mission-critical, confidential, sensitive or highly regulated documents.
Microsoft has made great strides in capacity and performance - but the scale of content management is daunting for most IT teams. Setting up individual permissions on each separate document is overwhelming; and the sprawling architecture of thousands of small redundant sites is just as challenging.
Taking Down the Two Giants of Inaccessible Web Content
Your organization could be at risk because of the scattered and disconnected approaches of past compliance information and processes. To prevent unanticipated risk exposure, your organization may require a governance, risk management and compliance (GRC) strategy that takes into account a thorough understanding of the state of your environment.
Information security is top of mind in light of recent high profile breaches impacting millions of consumers. If you’re a healthcare organization the need to protect patient data is paramount. The laws are getting more stringent and oversight from agencies other than HHS is around the corner. To further complicate matters, technology including the cloud and mobile, are rapidly expand the ways providers and payers share, store and access information.
Extending Your Data Security Controls to Office 365
The ease of access and availability of Office 365 has made it a compelling platform for many enterprises, in addition to its cost advantages. But it also brings many challenges. Is it safe to store confidential information in the cloud? How can it be secured? Can data protection policies be centralized across on-premises and Cloud environments?
Does Your Citrix or Terminal Server environment have an Achilles heel?
Citrix and Microsoft Windows Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. In this webinar we will discuss a new approach to controlling and securing access from Citrix/Terminal Servers into the trusted network.
Identifying SharePoint's Most Wanted Governance Offenders and Practical Solutions to Stop them in their Tracks
SharePoint creates a Wild West of unstructured content. The result, despite training and helpful reminders, is users having a hard time remembering the rules around data governance, inadvertently putting their organizations at risk.
This webinar exposes SharePoint’s Most Wanted characters, their sometimes risky behavior and annoying habits. It also offers 4 things you can do to stop them in their tracks, to ensure only the right people have access to the right content.
Recognition Rather Than Identity As The Foundation For Access Management
The IT security industry has become obsessed by proof of identify in a
bid to combat growing cyber security threats. However recent high
profile data breaches at organizations, such as Target and JP Morgan,
have demonstrated that even organizations with a strong identity based
security model are vulnerable to insider attacks, when a trusted
identity is hijacked.
This presentation introduces the concept of
recognition, where identity becomes, only one dynamic attribute amongst
many, used to determine user authenticity and grant access permissions,
in order to minimize IT security exposure in line with risk based
The Value of Metadata - Using it for Precision Access Control
Information architecture finally gets a helping hand with the second edition of Managed Metadata Service in SharePoint 2013. Join Cryptzone as we reviews SharePoint 2013’s managed metadata services for taxonomies, folksonomies, tags, metadata and content types.
Viewers will learn about architecture and usage for content management, catalogs, taxonomy, social networking, library and site navigation. We’ll also cover how to use Cryptzone's newest solution Site Sheriff to harvest metadata classifications for precision access control.