White Papers
Simply select a topic, enter your contact information and we’ll provide you with our latest cyber security white papers and technical details for all SHIELD solutions.
Shield’s Upcoming Events
Take advantage of learning more about Shield’s innovative data & network protection solutions by meeting with us in person. Join us in attendance at some of this year’s upcoming cybersecurity events. We look forward to seeing you there!
Join Shield this Thursday, January 24th for the second annual Silicon Valley Cyber Security Summit 2019 in San Jose, California. This summit is designed for networking with C-Suite & Senior executives who are responsible for protecting their organization’s critical infrastructures. Join us along with innovative solutions providers & renowned information security experts at this year’s summit!
DoubleTree by Hilton Hotel San Jose
2050 Gateway Pl,
San Jose, CA 95110
Learn More
Stop on by the BC Aware Day 2019 Conference this January 29th at the Pan Pacific Vancouver conveniently located in downtown Vancouver, British Columbia. This year’s conference theme will be focused on Women in IT & Security.
Pan Pacific Vancouver
300 – 999 Canada Place
Vancouver, BC
Canada
Learn More
Shield will be in attendance at this year’s CyberTech 2019 at the Israel Trade Fairs & Convention Center, in pavilion no.2 of the Tel Aviv Exhibition Center. Join us at one of the largest convention centers in the middle east and learn more about our innovative data & network protection solutions.
Israel Trade Fairs & Convention Center
Rokach Blvd 101, Tel Aviv-Yafo
Learn More
Stop on by Booth 631 MSP at this year’s MSP Expo 2019 located in Greater Ft. Lauderdale, Florida. This convention is designed for business owners and technology specialists to collaborate and grow their managed services business.
Greater Fort Lauderdale / Broward County Convention Center
1950 Eisenhower Blvd
Fort Lauderdale, FL 33316
Shield4UC and Silverfort will be presenting a cybersecurity focused ‘how to’ about adding secure authentication without rebuilding or modifying your infrastructure and systems. Stop by Frontenac Ballroom C on Wednesday September 11th at 11:35 AM. We speak until 12:05 PM and are also sponsoring the refreshment break at 3pm. We look forward to seeing you in Whistler!
Whistler, British Columbia / Fairmount Chateau Whistler
Regulatory Compliance
Security Compliance Reference Card
The Regulatory Compliance Solutions Reference Card will arm you with available solutions to meet top demands on industry-specific security compliance. learn more about how Shield’s innovative data & network security can help strengthen your organization’s compliance.
Get Started & Download The Compliance Reference Card Now!
Explore How Shield Can Strengthen Your Organization’s Compliance
Shield-Gate
Checks email, web and APIs for code hidden in data where it’s not supposed to be. Stops malicious code from entering the network. Provides defense against Zero-Day exploits and hacks.
Shield-SDE + Mobile
Secures and encrypts all data and files and allows only authorized users to access and share via email, web, fax or mobile app. Protects data against theft and ransomware attacks and other exploits.
Shield-SDA
Hides your organization from the Internet. Only allows specific application/service access to authorized users.
Shield-CyBot
Proactively analyses the entire network to detect ways hackers could exploit systems and business processes. Helps ensure preventative measures can be taken before hackers strike.
Shield-SDE + Mobile
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users. Isolates applications from the outside world.
Shield-SDE + Mobile
All external communications are via HTTPS (AES-256) encrypted links or SFTP (TLS – AES-256) transfer to/from SecureFax cloud.
Shield-SDA
All communications are HTTPS (AES-256) encrypted.
Shield-SDE + Mobile
All files & data are stored in secure and encrypted vaults and decrypted only when authorized and authenticated users have be granted access. Files are shared only over encrypted (HTTPS) links or via SecureFax.
Shield-SDE + Mobile
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users.
Shield-SDA
Enhances existing firewall and perimeter defenses with reverse access technology. It is a firewall in a constant deny-all state and is application aware so minimizes the attack surface available to hackers.
Shield-SDE
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users. Isolates applications from the outside world.
Shield-Gate
Checks email, web and APIs for code hidden in data where it’s not supposed to be. Stops malicious code from entering the network. Provides defense against Zero-Day exploits and hacks.
Shield-SDE + Mobile
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users.
Shield-Gate
Checks email, web and APIs for code hidden in data where it’s not supposed to be. Stops malicious code from entering the network. Provides defense against Zero-Day exploits and hacks.
Shield-Cybot
Warns in real time of outdated or missing patches and updates so these can quickly bapplied. Proactively analyses the entire network to detect ways hackers could exploit systems and business processes.
Shield-Cybot
Proactively analyses the entire network to detect ways hackers could exploit systems and business processes. Helps ensure preventative measures can be taken before hackers strike.
Shield-SDE + Mobile
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users. Isolates applications from the outside world.
Shield-SDE
Authenticates users via Active Directory or its own user management system and allows them access only to data/files and vaults they have permission to access and share.
Shield-SDA
Provides secure and transparent access to business systems only for authorized and authenticated users.
Shield-SDE
Keeps a full auditable history of all user access and distribution of secured files and data.
Shield-Cybot
Automated Penetration Testing to identify vulnerabilities with various IP-based systems and processes. Creates a visual map of attack path scenarios across all client networks; 24/7, 365 days per year. It lets you know how to stop the criminals before they get started. It ensures a secure compliant network.