For upcoming live webinars please visit our
SharePoint - Dynamic Collaboration and Encryption
SharePoint file encryption/decryption and Microsoft RMS can bring SharePoint performance to a halt – and these security measures can greatly impede user collaboration.
But you need to secure your SharePoint content! What can you do?
This presentation describes how every organization can secure their SharePoint and Office 365 files – at rest, and in transit.
SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access
Perimeter-based security, NAC’s, firewalls and VPNs are ineffective against malicious insiders, over-privileged users, and compromised third-party access.
What can you do?
This presentation describes how the Software-Defined Perimeter’s zero-trust security model provides capabilities to protect against modern IT security threats.
Rapid Web Accessibility and Continued Success
WCAG 2.0 AA is fast becoming a worldwide web accessibility standard.
This webinar outlines how to ensure your current – and future – web content complies.
Dynamically Securing SharePoint Content – Easily and Quickly
How can you
easily ensure only the right people can access, collaborate or distribute SharePoint content? How about O365 or OneDrive repositories?
This webinar discusses best practices to secure SharePoint content for common scenarios that require capabilities beyond what Microsoft provides.
Simplified Network Security across Physical, Virtual and Cloud-Based Systems
How can you unify and simplify secured network access control and compliance across hybrid systems?
This webinar describes The Cloud Security Alliance’s new security model, the
Software-Defined Perimeter, designed to secure access to today’s hybrid physical, virtual and cloud systems.
Website Accessibility Testing - What to Know for Successful Testing
How do you efficiently test that your website is accessible to individuals with disabilities?
This webinar describes lessons learned building effective accessibility testing frameworks and how to avoid pitfalls that plague many accessibility testing efforts.
How to be an Effective CISO: Lessons Learned from two Experts
Listen to this 20-minute podcast to gain perspective on improving your effectiveness as a CISO from Mark Arnold, now Senior Research Principal, Solutions R&D at Optiv, Inc. and Leo Taddeo, CSO for Cryptzone. We guarantee that you’ll leave the podcast with a few ideas that you can put to work today!
AWS Security – Simplify, Scale, & Secure User Access
How can you simplify the process of securing user access to AWS systems for your organization’s employees, contractors and third-parties?
This webinar will discuss lessons learned and new approaches to secure and audit user access to AWS – while also improving IT operational agility.
Website Accessibility - A Program to Reduce Litigation Risk
So-called “ADA letters” – letters sent by law firms alleging individuals with disabilities are denied access to an organization’s goods and services because of inaccessible websites – are increasing.
And the number of related lawsuits filed in federal court this year has surged.
What can you do?
This webinar describes specific steps to take to reduce your website accessibility litigation risk.
Securing Files for All Users, All Devices, All Locations - In Any SharePoint Environment
SharePoint’s native security does a lot. But many common collaboration scenarios require additional security capabilities beyond what SharePoint provides.
What can you do?
This webinar discusses how to secure files for all users, all devices, and all locations -- in any SharePoint environment.
Reducing PCI Scope and Effort with a Software-Defined Perimeter
Learn how SageNet, a managed services provider managing 160,000+ customer locations, helped a convenience store chain with 600+ locations improve security and reduce PCI audit scope by more than 50% using Cryptzone’s AppGate.
EU GDPR - Worldwide IT Compliance & Security Implications
Starting May 2018, any company managing data about EU citizens can be fined up to 4% of global company revenues if found to be non-compliant with the EU’s new General Data Protection Regulation (GDPR).
Will your IT systems and data processes be ready?
Network Access Control vs. Software-Defined Perimeter – or both?
Network security is changing.
Learn why leading organizations are rapidly adopting a Software-Defined Perimeter instead of a traditional Network Access Control security model.
Website Liability Under US Accessibility Laws
Civil rights laws like the American Disabilities Act (ADA) require that businesses offer people with disabilities the same access to content and information as everyone else.
Ken Nakata, a former Senior Trial Attorney with the U.S. Department of Justice and who has specialized in accessibility for the last 24 years, discuses this topic
SharePoint Migration – Securing data on premises, online and anywhere in between
SharePoint Online and Office 365 migration projects can be complicated, often because of information security concerns. So, how can you simplify and accelerate the process by applying security and privacy policies early in the transition?
This webinar will show you how.
From CNBC to You - Leo Taddeo Podcast
This podcast features a lively Q&A session with Leo Taddeo, Cryptzone’s CSO and former FBI Agent in Charge of the Special Operations/Cyber Division of the New York office. The discussion ranged from the state of cybercrime to discussing the benefits of a software-defined perimeter approach to network access, and more!
Listen to the Podcast here!
Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS
Join us to learn more about how AppGate XDP can simplify your IaaS security challenges and discuss the following topics:
The trend toward IaaS The benefits of cost savings in a dynamic and elastic environment IaaS enables technical and business agility – DevOps Security for IaaS isn’t easy - IaaS tools are not user-centric, and are all-or-nothing Software Defined Perimeter for IaaS can help
Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security
This Webinar will give information on traditional access control solutions typically provide all-or-nothing network access, which has led to the security gaps behind many of today’s headline-making breaches.
Cryptzone recently released a new product, AppGate XDP, which closes this gap through dynamic, attribute-based controls that determine access across cloud, virtual and physical infrastructures.
Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag
This webinar will identify the limitations of existing security solutions and show how implementing the "Zero Trust" architecture will help build security into your network's DNA.
The Software Defined Perimeter: Creating an Invisible Infrastructure
on-demand webinar, you’ll learn: How IT and security teams are evolving their approach to access control to solve the increased threat posed by stolen credentials What a software defined perimeter (SDP) is and how it can solve evolving access control needs How to make your applications and server infrastructures effectively “invisible” to limit threats
Stolen Privileged User Credentials: How can you protect your network from privileged user attacks?
Control Privileged User Access While Simplifying Deployment And Management
During this webinar you'll learn:
How to apply a Zero Trust Strategy
How to make non-authorized network resources invisible to cyber criminals
Solutions to protect your business
View the On-Demand webinar
AppGate for AWS
Find out how AppGate for AWS can help you
What is Security Sheriff?
Check out this 2 minute explanation of Security Sheriff!
Leo Taddeo Interview at Black Hat - Dark Reading News Desk
Leo Taddeo - CSO of Cryptzone interview at Black Hat 2016
What is AppGate?
Check out this 2 minute explanation of AppGate!
MS Ignite 2016 - Paul Campaniello Interview
Paul Campaniello, CMO of Cryptzone, is interviewed at MS Ignite 2016 by David Kaufman