Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security
Information security risk mitigation
Empowering people to work securely
The Cryptzone Group Cryptzone offers proactive user-Âfriendly solutions and services that mitigate IT security risk. Our innovative products empower people to work securely wherever, whenever and however they want. Whether at home or work, or even RQWKHPRYH&U\SW]RQHGHOLYHUVIDPLOLDUEXVLQHVVDSSOLFDWLRQVLQDXQLĂ€HGDQGVHFXUHZRUNLQJHQYLURQPHQW By reducing complexity and providing a simple common user experience, the burden on IT administrators is reduced, business continuity maintained and workers become more productive. +HDGTXDUWHUHGLQ6ZHGHQDQGOLVWHGRQ7KH)LUVW1RUWKVWRFNH[FKDQJH&U\SW]RQHKDVRIĂ€FHVDURXQGWKHZRUOG &XVWRPHUVLQFOXGH)RUWXQHFRPSDQLHVJRYHUQPHQWDQGGHIHQVHRUJDQL]DWLRQVĂ€QDQFLDOLQVWLWXWLRQV and companies in a wide range of other market segments.
Professional services & technical support The Cryptzone professional services and support teams work with customers to ensure the success of each project. Having developed a collaborative approach to service delivery, our highly skilled sales and technical personnel are able to ensure customers optimize the on-Âgoing value of their IT security investment in Cryptzone products. Thatâ€™s why more than 95% of Cryptzone customers choose to stay with us year after year. Cryptzone is a global IT security vendor with international customers. â€œFollow the sunâ€? support structures enable us to provide world-Âclass support 24/7 365. In addition, we offer Security-Âas-Âa-ÂService for organizations that choose to adopt effective and affordable cloud computing services. Our world-Âwide network of trusted partners is able to assist customers with the evaluation, deployment and training options around the Cryptzone solution portfolio.
What we do
Optimize security, governance and compliance efforts to reduce risk and meet regulatory requirements. Deploy effective IT security solutions to protect sensitive DQGFRQĂ€GHQWLDOLQIRUPDWLRQ Maximize the business value of IT security investments in a rapidly changing commercial and regulatory environment.
There are risks and costs to a program of action. But they are far less than the long-Â range risks and costs of comfortable inaction. John F. Kennedy
IT security risk mitigation
The strategic importance of information security has increased during the 21st century. Issues of data SURWHFWLRQSULYDF\DQGFRQĂ€GHQWLDOLW\RILQIRUPDWLRQ are of paramount importance.
$QRUJDQL]DWLRQÂˇVĂ€UVWOLQHRIGHIHQVHIRUVWUHQJWKHQLQJ security is its users. Creating a security aware culture, where everyone shares responsibility for protecting information assets, reduces the likelihood of human error, which is a major factor in many security incidents.
Today technology risks have the ability to impact reputation, equity value and can even threaten an organizationâ€™s very existence. The management of regulatory compliance and information security therefore requires active board level oversight. It is vital that board members and senior management teams understand the IT security risks facing their organizations and the risk mitigation strategies they can adopt to counter them.
Cryptzone software helps you better manage the human side of IT security risk mitigation.
Processes $QHIIHFWLYHVHFXULW\SROLF\DQGZRUNĂ RZSURFHVV can only be effective if those processes are adhered to by everyone.
Use Cryptzone solutions to communicate, monitor and enforce your security policies and processes
IT security initiatives must be in line with corporate risk objectives and add value to the business in order to support an organizationâ€™s ultimate strategic objectives.
The Cryptzone Group brings together the people, processes and technology in order to mitigate LQIRUPDWLRQVHFXULW\ULVNVLGHQWLĂ€HGLQIRXUNH\DUHDV
Policy Compliance Content Security Secure Access Endpoint Security
Security threats are becoming more sophisticated and PRUHGLIĂ€FXOWWRGHWHFWDQGLQWHUFHSW$W&U\SW]RQHZH have developed ground breaking technical controls for IT security risk mitigation. Our award winning technologies offer policy based security and technical controls that address the challenges of an increasingly demanding world. Implement Cryptzone software in your IT environment or get selected services provided in a cloud based infrastructure.
Policy Compliance Assure total governance across the enterprise
The human factor
Policy life-Âcycle management
Out-Âof-Âdate, poorly communicated, unenforced policies, procedures and guidelines put your organization at risk of non-Âcompliance with legislative and regulatory obligations.
Measure & monitor understanding
How do you ensure your people read, understand and comply with corporate expectations?
Effective automation Cryptzone provides practical, automated policy management tools to measure, monitor and manage policy compliance at all levels within your organization. Automated delivery of your eLearning and communication program ensures users understand why policies exist, as well as their responsibilities.
Communicate & enforce &XWFRVWLQHIĂ€FLHQF\DQGWKHDGPLQLVWUDWLYHEXUGHQ of tracking who has received, read and agreed to policies.
Monitor & measure Mitigate risk by raising policy awareness and improving user comprehension.
Prove regulatory compliance Give managers and auditors access to accurate reports to help identify & address non-Âcompliance.
It is reassuring for the business to know that we can produce evidence of policy compliance at the click of a button. Head of Compliance, International Bank
User awareness & education Corporate communications Risk management reporting
Content Security Empower end users to protect information
Data protection has become a legal obligation of concern to both IT and business managers. As the demand for mobile connectivity and collaborative working has increased, so has the need to protect sensitive information.
Encrypt emails and attachments
How do you ensure that information is secured no matter where it is stored or being transmitted?
Collaboration is key Cryptzone content security solutions empower people to store information securely and collaborate safely with both internal and external parties. No matter whether data is in use, in transit, or stored in a variety of remote locations, Cryptzone has the tools to secure it. (PSRZHUXVHUVWRVHFXUHĂ€OHVIROGHUVDQGGRFXPHQWV in Microsoft SharePoint ÂŽ, email messages and USB Ă DVKGULYHV Enable your users to easily assign access rights to internal or external collaboration partners without having to manage encryption keys. Cryptzoneâ€™s unique Enterprise Protection Method (EPM) technology provides automatic authentication and encryption keys for your users. Send secured emails to any recipient no matter what email application, web site or device. This includes Outlook ÂŽ, Lotus Notes ÂŽ, Gmail, Hotmail, Mac, PC, iPhone, iPad, Blackberry, Android ÂŽ and Windows Phone ÂŽ. The recipient can simply and easily read and reply back securely from any device with access to the Internet. Cryptzone content security offerings are also available as SaaS solutions.
We observed a priority need to encrypt our HPDLOVĂ€OHV IROGHUVDQG86%Ă DVKGULYHV IT Coordinator, Construction Company
(QFU\SWĂ€OHVDQGIROGHUV Secure collaboration for Microsoft SharePoint ÂŽ 86%Ă DVKGULYHHQFU\SWLRQ Data loss prevention
Secure Access Securely connect from any device and any location
New working patterns 7KHJURZWKRIHQWHUSULVHFROODERUDWLRQDVZHOODVÁH[LEOH and mobile working practices has resulted in the collapse of the traditional network. Workers require the same level of access to business applications, data and services whether internal or external to the corporate network. ,V\RXURUJDQL]DWLRQXQGHUSUHVVXUHWRSURYLGHXQLÀHG access to network resources & to maintain security?
A different approach Cryptzone solutions allow seamless controlled policy- based connectivity and ease of use, whatever the location or mode of connection.
Secure mobile working Securely connect users from any device and any location. Using policy-based solutions, Cryptzone can determine whether a user is on a trusted device in a trusted location, an untrusted device in an untrusted location or any mixture of the two and deploy access rights accordingly.
Network access management Mobile access (Apple, Windows, Android) SSL/SSH VPN Document access control Business continuity/disaster recovery Internal network segmentation One Time Password support
Cost-effective authentication SMS, mobile device and token authentication is supported. Cryptzone’s One Time Password authentication removes the need for expensive tokens to authenticate users.
Low maintenance overhead Dynamic security policies ensure access is automatically assigned without user or administrator intervention, HQDEOLQJFHQWUDOL]HGFRQÀJXUDWLRQ
Emergency response A plan to minimize business disruption reduces the potential impact on worker productivity and customer service. Secure remote access is a simple and cost- HIIHFWLYHZD\IRURIÀFHVWDIIWRZRUNDVQRUPDOLQWKH event of an emergency. Cryptzone provides a 90 day emergency unlimited user licence for when an unpredictable event occurs and more users require remote access.
We can now offer our employees a more ÁH[LEOHDSSURDFKWRZRUNLQJZLWKRXW worrying about whether our data is at risk. IT Director, Healthcare
Endpoint Security Data protection and loss prevention for endpoints
Known or unknown threat
The use of PCs, laptops and mobile devices has dramatically risen in recent years. While the increased storage capacity of these devices has improved accessibility to information and improved worker HIĂ€FLHQF\LWH[SRVHVRUJDQL]DWLRQVWRDJUHDWHUULVNRI GDWDORVVUHJXODWRU\Ă€QHVDQGEUDQGGDPDJH
Given the speed and regularity with which new security threats are introduced, reliance on malware detection alone is no longer acceptable.
Do you know where your data is and how it is being used?
Cryptzoneâ€™s application whitelisting technology controls which applications are allowed to run on a device or system, so it no longer matters if a threat is known or unknown.
Authorized access Crytpzoneâ€™s portfolio of encryption products prevents unauthorized access to devices and data whether at rest or in motion. Secure your hardware with transparent, centrally managed full hard disk encryption. Monitor and control data movement to peripheral devices with port control. Ensure data stored on a device is only accessible to DXWKRUL]HGXVHUVZLWK86%Ă DVKGULYHHQFU\SWLRQ Track and report the movement of and access to data. Issue a â€œLock Outâ€? or â€œKill Pillâ€? command to lost or stolen Ă DVKGULYHVLQRUGHUWRPLWLJDWHULVN
Device, media & port control 86%Ă DVKGULYHHQFU\SWLRQ File & folder encryption Full disk encryption Application whitelisting
Innovative technology allows us to centrally manage security policies and authorize the use of removable media. &KLHI7HFKQRORJ\2IĂ€FHU International Finance
Empowering people to work securely
Solution portfolio Policy Compliance
Netconsent Compliance Suite
Policy management system
Automated business communication
Electronic announcements on a need-Âto-Âknow basis
Secured eMail *
Policy controlled email encryption
Secured eFile *
Secured eCollaboration *
Add on for Microsoft SharePoint ÂŽĂ€OHHQFU\SWLRQ
Secured eUSB *
Centrally managed USB encryption deployment tool
Policy enforcement and data detection
Appgate Security Server
Appliance for role based access control
Appgate for Mobile Devices
Secure access for iPad, iPhone and Android
Secure virtual network
One time password
Java implementation of the SSH2 client
Secured eUSB *
Centrally managed USB encryption deployment tool
Port & device control
Hard disk encryption
SE46 Application Control
Application white listing
Appgate Device Firewall
(QGSRLQWĂ€UHZDOO * The solution is also available as SaaS (Security-Âas-Âa-ÂService).
Cryptzone Group AB Drakegatan 7, SE-Â412 50 Gothenburg, Sweden
Cryptzone UK Ltd. Sentinel House, Harvest Crescent, Fleet, Hampshire, GU51 2UZ. UK
For more information go to www.cryptzone.com/partners
7HO +46 (0)31 773 86 00 )D[
7HO +44 (0)370 013 1600 )D[
email@example.com firstname.lastname@example.org email@example.com
For other regions visit www.cryptzone.com
Cryptzone US Inc. 185 Alewife Brook Parkway, Suite 410, Cambridge MA 02138, USA 7HO +1.949.279.6177 )D[
&RS\ULJKW&U\SW]RQH*URXS$OOULJKWVUHVHUYHG&U\SW]RQH7KH&U\SW]RQH/RJR$SSJDWH1HWFRQVHQWDQG6(DUHWUDGHPDUNVRI&U\SW]RQH*URXSRULWVDIĂ€OLDWHV This brochure is an independent publication and has not been authorized, sponsored, or otherwise approved by Apple Inc. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. iPhone, iPad and Mac are trademarks of Apple Inc., registered in the U.S. and other countries. All other product names mentioned herein are trademarks of their respective owners.
Proactive controls to mitigate IT security risk