Resource Library

Webinars & Videos

For upcoming live webinars please visit our Events Page.


Webinars

The Software Defined Perimeter: Creating an Invisible Infrastructure

According to a recent Cryptzone survey conducted with TechValidate, 90% of companies are using aging VPN technology for network access control. That’s a flawed model that no longer works in the era of the cloud, BYOD and the Internet of Things.

During this on-demand webinar, you’ll learn:

  • How IT and security teams are evolving their approach to access control to solve the increased threat posed by stolen credentials
  • What a software defined perimeter (SDP) is and how it can solve evolving access control needs
  • How to make your applications and server infrastructures effectively “invisible” to limit threats
The Software Defined Perimeter: Creating an Invisible Infrastructure Webinar

Cryptzone IT-Harvest Interview with Richard Stiennon

Cryptzone sits down with IT-Harvest's Richard Stiennon to talk about rapidly evolving cyber threats and how AppGate’s context aware, dynamic approach to secure access can protect your organization against today’s advanced cyberattacks.

View the Interview Here

Cryptzone IT-Harvest Interview with Richard Stiennon  Webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks?

Control Privileged User Access While Simplifying Deployment And Management

During this webinar you'll learn:

  • How to apply a Zero Trust Strategy
  • How to make non-authorized network resources invisible to cyber criminals
  • Solutions to protect your business

View the On-Demand webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks? Webinar

Reining in Sites and Permissions in SharePoint with Site Sheriff

Every year, the volume of enterprise content in SharePoint grows. Now, more than ever, organization are also using SharePoint for mission-critical, confidential, sensitive or highly regulated documents.

Microsoft has made great strides in capacity and performance - but the scale of content management is daunting for most IT teams. Setting up individual permissions on each separate document is overwhelming; and the sprawling architecture of thousands of small redundant sites is just as challenging.

View the On-Demand Webinar

Reining in Sites and Permissions in SharePoint with Site Sheriff Webinar

Taking Down the Two Giants of Inaccessible Web Content

Your organization could be at risk because of the scattered and disconnected approaches of past compliance information and processes. To prevent unanticipated risk exposure, your organization may require a governance, risk management and compliance (GRC) strategy that takes into account a thorough understanding of the state of your environment.

View the On-Demand Webinar

Taking Down the Two Giants of Inaccessible Web Content Webinar

HIPAA & Secure Information Governance - Myths, Realities & Practical Solutions

Information security is top of mind in light of recent high profile breaches impacting millions of consumers. If you’re a healthcare organization the need to protect patient data is paramount. The laws are getting more stringent and oversight from agencies other than HHS is around the corner. To further complicate matters, technology including the cloud and mobile, are rapidly expand the ways providers and payers share, store and access information.

View the On-Demand Webinar

HIPAA & Secure Information Governance - Myths, Realities & Practical Solutions Webinar

Extending Your Data Security Controls to Office 365

The ease of access and availability of Office 365 has made it a compelling platform for many enterprises, in addition to its cost advantages. But it also brings many challenges. Is it safe to store confidential information in the cloud? How can it be secured? Can data protection policies be centralized across on-premises and Cloud environments?

View the On-Demand Webinar

Extending Your Data Security Controls to Office 365 Webinar

Identifying SharePoint's Most Wanted Governance Offenders and Practical Solutions to Stop them in their Tracks

SharePoint creates a Wild West of unstructured content. The result, despite training and helpful reminders, is users having a hard time remembering the rules around data governance, inadvertently putting their organizations at risk.

This webinar exposes SharePoint’s Most Wanted characters, their sometimes risky behavior and annoying habits. It also offers 4 things you can do to stop them in their tracks, to ensure only the right people have access to the right content.

View the On-Demand Webinar Here

Identifying SharePoint's Most Wanted Governance Offenders and Practical Solutions to Stop them in their Tracks Webinar

The Value of Metadata - Using it for Precision Access Control

Information architecture finally gets a helping hand with the second edition of Managed Metadata Service in SharePoint 2013. Join Cryptzone as we reviews SharePoint 2013’s managed metadata services for taxonomies, folksonomies, tags, metadata and content types.

Viewers will learn about architecture and usage for content management, catalogs, taxonomy, social networking, library and site navigation. We’ll also cover how to use Cryptzone's newest solution Site Sheriff to harvest metadata classifications for precision access control.

View the On-Demand Webinar

The Value of Metadata - Using it for Precision Access Control Webinar

USB Encryption & Full Lifecycle Management

This is your chance to learn about USB Life Cycle Management through birth (deployment), life (usage monitoring) & death (loss prevention). Find simple ways to take the burden off your IT administrators by giving them tools to improve IT security, while maintaining worker productivity. See this recorded webinar to: - Discover how you can reduce risks of flash drive usage - Improve DLP efforts without overburdening your IT department - See a live demonstration of the key Secured eUSB features that secure data: - Forced encryption of flash drives; - Lock out & Kill Pill command to wipe lost or stolen flash drives; - Extended reporting to track data transfers and content changes.

USB Encryption & Full Lifecycle Management Webinar

Protect PII and Sensitive Information - Collaborative Access of Encrypted Files/Folders

This webinar discusses how to secure sensitive information when it is "at rest" and wherever it's stored within your Enterprise - network share drives, desktops, laptops, USB flash drive, even CD and DVDs. Learn how Cryptzone's Enterprise Protection Method (EPM) eliminates the need for digital signatures and provides a fool-proof method of authentication and key management. Listen to security experts explore how Secured eFile centrally controls user behavior to minimize accidental breaches of sensitive and confidential information. See how the integrated encryption platform reduces the IT administrative burden by providing tools that improve security and worker productivity.

Protect PII and Sensitive Information - Collaborative Access of Encrypted Files/Folders Webinar

Short Videos

Kill Pill for SEP Secured eUSB

If a user has lost or misplaced a USB flash drive IT can issue a 'lockout' command to block access to the device - administrators can unlock the device if required. If a secured USB drive is stolen or an employee leaves the company without returning their USB flash drives, the "Kill Pill" command will completely wipe the flash drive clean to ensure complete data protection. This will even work over the Internet.

Kill Pill for SEP Secured eUSB Webinar

Enforce Encryption of Flash Drives

For most organizations it's important to ensure that all data that is saved to USB flash drives are encrypted. With the Secured eUSB solution it is possible to set up so users will be enforced to encrypt flash drives to be able to store information on them. For example, IT can set up a device policy to allow end users to be able to plug in any USB flash drive and read data. However, in order to write data to the drive, the user must encrypt and secure the drive beforehand. This policy will ensure that end users can read data from private flash drives and customer flash drives but to be able to store data to a flash drive it must be encrypted with the Secured eUSB technology. The solution also offer the possibility to block out so USB flash drives cannot be used at all.

Enforce Encryption of Flash Drives Webinar

Open Secured eMail

With Secured eMail the recipient can open the encrypted email on almost any platform or email service including PC, Mac, iPhone, iPad, Blackberry, Android phones, Windows Mobile phones, Linux, all types of webmail like Gmail, Hotmail, Outlook OWA. The only requirement is an internet browser and an internet connection.

Open Secured eMail Webinar

Encrypt an Email

Secured eMail integrates into Microsoft Outlook and Lotus Notes so that users can use the email client as usual. To secure the contents of an email and send a secured message, the user simply presses the "Send Secured" button. The secured content is delivered as an attachment wrapped in an ordinary email. The "wrap-mail" provides plain text instructions to the recipient about what they need to do to read the secured contents.

Encrypt an Email Webinar