For upcoming live webinars please visit our Events Page.
Cryptzone IT-Harvest Interview with Richard Stiennon
Cryptzone sits down with IT-Harvest's Richard Stiennon to talk about rapidly evolving cyber threats and how AppGate’s context aware, dynamic approach to secure access can protect your organization against today’s advanced cyberattacks.
Stolen Privileged User Credentials: How can you protect your network from privileged user attacks?
Control Privileged User Access While Simplifying Deployment And Management
Traditional cyber protection models are clearly failing. If you think that better credential management is the answer, Think Again.
During this webinar you'll learn:
- How to apply a Zero Trust Strategy
- How to make non-authorized network resources invisible to cyber criminals
- Solutions to protect your business
Does your Citrix or Terminal Server environment have an Achilles heel?
Citrix and Microsoft Windows Terminal Servers provide highly valuable functionality for session-based access, but to date have had an Achilles heel when it comes to privileged account management across multiple users. In this webinar we will discuss a new approach to controlling and securing access from Citrix/Terminal Servers into the trusted network.
View the On-Demand webinar
Recognition rather than Identity as the foundation for access management
The IT security industry has become obsessed by proof of identify in a
bid to combat growing cyber security threats. However recent high
profile data breaches at organizations, such as Target and JP Morgan,
have demonstrated that even organizations with a strong identity based
security model are vulnerable to insider attacks, when a trusted
identity is hijacked.
This presentation introduces the concept of
recognition, where identity becomes, only one dynamic attribute amongst
many, used to determine user authenticity and grant access permissions,
in order to minimize IT security exposure in line with risk based
So You Think SharePoint Is Secure?
Organizations implement Microsoft SharePoint to improve knowledge sharing and boost collaboration, which in many cases include confidential and commercially sensitive information. However the results of a recent survey sponsored by Cryptzone, reveal that a sizable majority disregard security measures and opt to share information illicitly with unauthorized third parties. This presentation will briefly share the key findings of the survey undertaken at a SharePoint conference. It will go on to explore two security approaches to increase SharePoint security: - 3 Dimensional Permissions: User and context based encryption of any document type held within SharePoint. Documents remain 'controlled' outside the SharePoint environment for secure collaboration. - Context Aware Access: Limiting the amount of access to internal SharePoint servers based on a user's context and the device used.
USB Encryption & Full Lifecycle Management
This is your chance to learn about USB Life Cycle Management through birth (deployment), life (usage monitoring) & death (loss prevention). Find simple ways to take the burden off your IT administrators by giving them tools to improve IT security, while maintaining worker productivity. See this recorded webinar to: - Discover how you can reduce risks of flash drive usage - Improve DLP efforts without overburdening your IT department - See a live demonstration of the key Secured eUSB features that secure data: - Forced encryption of flash drives; - Lock out & Kill Pill command to wipe lost or stolen flash drives; - Extended reporting to track data transfers and content changes.
Protect PII and Sensitive Information - Collaborative Access of Encrypted Files/Folders
This webinar discusses how to secure sensitive information when it is "at rest" and wherever it's stored within your Enterprise - network share drives, desktops, laptops, USB flash drive, even CD and DVDs. Learn how Cryptzone's Enterprise Protection Method (EPM) eliminates the need for digital signatures and provides a fool-proof method of authentication and key management. Listen to security experts explore how Secured eFile centrally controls user behavior to minimize accidental breaches of sensitive and confidential information. See how the integrated encryption platform reduces the IT administrative burden by providing tools that improve security and worker productivity.
Kill Pill for SEP Secured eUSB
If a user has lost or misplaced a USB flash drive IT can issue a 'lockout' command to block access to the device - administrators can unlock the device if required. If a secured USB drive is stolen or an employee leaves the company without returning their USB flash drives, the "Kill Pill" command will completely wipe the flash drive clean to ensure complete data protection. This will even work over the Internet.
Enforce Encryption of Flash Drives
For most organizations it's important to ensure that all data that is saved to USB flash drives are encrypted. With the Secured eUSB solution it is possible to set up so users will be enforced to encrypt flash drives to be able to store information on them. For example, IT can set up a device policy to allow end users to be able to plug in any USB flash drive and read data. However, in order to write data to the drive, the user must encrypt and secure the drive beforehand. This policy will ensure that end users can read data from private flash drives and customer flash drives but to be able to store data to a flash drive it must be encrypted with the Secured eUSB technology. The solution also offer the possibility to block out so USB flash drives cannot be used at all.
Open Secured eMail
With Secured eMail the recipient can open the encrypted email on almost any platform or email service including PC, Mac, iPhone, iPad, Blackberry, Android phones, Windows Mobile phones, Linux, all types of webmail like Gmail, Hotmail, Outlook OWA. The only requirement is an internet browser and an internet connection.
Encrypt an Email
Secured eMail integrates into Microsoft Outlook and Lotus Notes so that users can use the email client as usual. To secure the contents of an email and send a secured message, the user simply presses the "Send Secured" button. The secured content is delivered as an attachment wrapped in an ordinary email. The "wrap-mail" provides plain text instructions to the recipient about what they need to do to read the secured contents.