Resource Library

Webinars & Videos

For upcoming live webinars please visit our Events Page.


Webinars

From CNBC to You - Leo Taddeo Podcast

This podcast features a lively Q&A session with Leo Taddeo, Cryptzone’s CSO and former FBI Agent in Charge of the Special Operations/Cyber Division of the New York office. The discussion ranged from the state of cybercrime to discussing the benefits of a software-defined perimeter approach to network access, and more!

Listen to the Podcast here!

From CNBC to You - Leo Taddeo Podcast Webinar

Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS

Join us to learn more about how AppGate XDP can simplify your IaaS security challenges and discuss the following topics:

  • The trend toward IaaS
  • The benefits of cost savings in a dynamic and elastic environment
  • IaaS enables technical and business agility – DevOps
  • Security for IaaS isn’t easy - IaaS tools are not user-centric, and are all-or-nothing
  • Software Defined Perimeter for IaaS can help

Learn More

Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS Webinar

Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security

This Webinar will give information on traditional access control solutions typically provide all-or-nothing network access, which has led to the security gaps behind many of today’s headline-making breaches.

Cryptzone recently released a new product, AppGate XDP, which closes this gap through dynamic, attribute-based controls that determine access across cloud, virtual and physical infrastructures.

Learn More

Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security Webinar

Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag

This webinar will identify the limitations of existing security solutions and show how implementing the "Zero Trust" architecture will help build security into your network's DNA.

Learn More

Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag Webinar

The Software Defined Perimeter: Creating an Invisible Infrastructure

During this on-demand webinar, you’ll learn:

  • How IT and security teams are evolving their approach to access control to solve the increased threat posed by stolen credentials
  • What a software defined perimeter (SDP) is and how it can solve evolving access control needs
  • How to make your applications and server infrastructures effectively “invisible” to limit threats

Learn More

The Software Defined Perimeter: Creating an Invisible Infrastructure Webinar

Cryptzone IT-Harvest Interview with Richard Stiennon

Cryptzone sits down with IT-Harvest's Richard Stiennon to talk about rapidly evolving cyber threats and how AppGate’s context aware, dynamic approach to secure access can protect your organization against today’s advanced cyberattacks.

View the Interview Here

Cryptzone IT-Harvest Interview with Richard Stiennon  Webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks?

Control Privileged User Access While Simplifying Deployment And Management

During this webinar you'll learn:

  • How to apply a Zero Trust Strategy
  • How to make non-authorized network resources invisible to cyber criminals
  • Solutions to protect your business

View the On-Demand webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks? Webinar

Reining in Sites and Permissions in SharePoint with Site Sheriff

Every year, the volume of enterprise content in SharePoint grows. Now, more than ever, organization are also using SharePoint for mission-critical, confidential, sensitive or highly regulated documents.

Microsoft has made great strides in capacity and performance - but the scale of content management is daunting for most IT teams. Setting up individual permissions on each separate document is overwhelming; and the sprawling architecture of thousands of small redundant sites is just as challenging.

View the On-Demand Webinar

Reining in Sites and Permissions in SharePoint with Site Sheriff Webinar

Taking Down the Two Giants of Inaccessible Web Content

Your organization could be at risk because of the scattered and disconnected approaches of past compliance information and processes. To prevent unanticipated risk exposure, your organization may require a governance, risk management and compliance (GRC) strategy that takes into account a thorough understanding of the state of your environment.

View the On-Demand Webinar

Taking Down the Two Giants of Inaccessible Web Content Webinar

HIPAA & Secure Information Governance - Myths, Realities & Practical Solutions

Information security is top of mind in light of recent high profile breaches impacting millions of consumers. If you’re a healthcare organization the need to protect patient data is paramount. The laws are getting more stringent and oversight from agencies other than HHS is around the corner. To further complicate matters, technology including the cloud and mobile, are rapidly expand the ways providers and payers share, store and access information.

View the On-Demand Webinar

HIPAA & Secure Information Governance - Myths, Realities & Practical Solutions Webinar

Extending Your Data Security Controls to Office 365

The ease of access and availability of Office 365 has made it a compelling platform for many enterprises, in addition to its cost advantages. But it also brings many challenges. Is it safe to store confidential information in the cloud? How can it be secured? Can data protection policies be centralized across on-premises and Cloud environments?

View the On-Demand Webinar

Extending Your Data Security Controls to Office 365 Webinar

Does Your Citrix or Terminal Server environment have an Achilles heel?

Citrix and Microsoft Windows Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. In this webinar we will discuss a new approach to controlling and securing access from Citrix/Terminal Servers into the trusted network.

View the On-Demand webinar

Does Your Citrix or Terminal Server environment have an Achilles heel? Webinar

Identifying SharePoint's Most Wanted Governance Offenders and Practical Solutions to Stop them in their Tracks

SharePoint creates a Wild West of unstructured content. The result, despite training and helpful reminders, is users having a hard time remembering the rules around data governance, inadvertently putting their organizations at risk.

This webinar exposes SharePoint’s Most Wanted characters, their sometimes risky behavior and annoying habits. It also offers 4 things you can do to stop them in their tracks, to ensure only the right people have access to the right content.

View the On-Demand Webinar Here

Identifying SharePoint's Most Wanted Governance Offenders and Practical Solutions to Stop them in their Tracks Webinar

Recognition Rather Than Identity As The Foundation For Access Management

The IT security industry has become obsessed by proof of identify in a bid to combat growing cyber security threats. However recent high profile data breaches at organizations, such as Target and JP Morgan, have demonstrated that even organizations with a strong identity based security model are vulnerable to insider attacks, when a trusted identity is hijacked.

This presentation introduces the concept of recognition, where identity becomes, only one dynamic attribute amongst many, used to determine user authenticity and grant access permissions, in order to minimize IT security exposure in line with risk based policies.

View the On-Demand Webinar

Recognition Rather Than Identity As The Foundation For Access Management Webinar

The Value of Metadata - Using it for Precision Access Control

Information architecture finally gets a helping hand with the second edition of Managed Metadata Service in SharePoint 2013. Join Cryptzone as we reviews SharePoint 2013’s managed metadata services for taxonomies, folksonomies, tags, metadata and content types.

Viewers will learn about architecture and usage for content management, catalogs, taxonomy, social networking, library and site navigation. We’ll also cover how to use Cryptzone's newest solution Site Sheriff to harvest metadata classifications for precision access control.

View the On-Demand Webinar

The Value of Metadata - Using it for Precision Access Control Webinar

Short Videos

What is AppGate?

Check out this 2 minute explanation of AppGate!