ssl

Results 326 - 350 of 637Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Learn how financial institutions are benefiting from Extended Validation (EV) SSL Certificates.
Tags : 
banks, financial, extended validation, sgc, online security, charles schwab, verisign, trust marks, secured, security, ssl solutions, green bar
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, wpa
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
Integrated campaigns involving both traditional and digital marketing channels have demanded that brands utilize multiple agencies when executing a marketing campaign. To seamlessly combine all of these independent agencies, brands need to utilize agency summits, meetings that help get all sides to collaborate, cooperate, and create as a single unit rather than act as rival agencies.
Tags : 
leapfrog, agency, coordination, cooperation, marketing, advertising, campaign, digital, traditional, collaboration, cooperation, interactive/pr agencies
    
LeapFrog Interactive
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats, threat vectors, service platforms, mitigation
    
F5 Networks Inc
Published By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : 
yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy, truste, bbb, reputation, ssl, verisign, scanning, trust and security
    
McAfee, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
best, practices, applications, tls, ssl, secure, business computing, transport layer security, secure sockets layer
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi, wi-fi, tls, protect
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Unitrends     Published Date: Apr 12, 2010
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users?
Tags : 
unitrends, backup, data protection, data quality, server, replication, lossless, lossy, data compression
    
Unitrends
Published By: Dell     Published Date: Nov 04, 2013
Learn to quickly, easily and seamlessly manage your complex databases environments. Read this white paper today.
Tags : 
dell, database, methodology, infrastructure, dba
    
Dell
Published By: IBM     Published Date: Oct 10, 2013
e IBM journey toward unified communications for mobile and social collaboration. Many of today's innovations are driven by the consumer marketplace, and the workplace is no exception. As consumers, we are very familiar with new ways for people to find each other, keepin touch, share ideas and be mobile, getting information from many place. As employees, we would like to apply these consumer capabilities to our work - seamlessly and on a global basis - to make us more productive and effective with business colleagues, clients and business partners. This white paper discusses IBMs infrastructure transformation over the first 12 years, summary value proposition, and volution in supporting mobile devices and BYOD.
Tags : 
collaboration, infrastructure, mobile, social, communication system, unification, mobile collaboration, social collaboration, byod, ibm, bring your own device, infrastructure, infrastructure transformation, summary value proposition, mobile devices
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
View this demo to learn how IBM Platform Computing Cloud Service running on the SoftLayer Cloud helps you: quickly get your applications deployed on ready-to-run clusters in the cloud; manage workloads seamlessly between on-premise and cloud-based resources; get help from the experts with 24x7 Support.
Tags : 
ibm, cloud, cloud computing, hpc, softlayer, cloud clusters
    
IBM
Published By: Epicor     Published Date: Nov 02, 2015
While a manufacturing execution system (MES) is often viewed as “just” a tool for helping the “shop people” go about their day-to-day tasks, the fact is that such a system also has more than ample potential to help transform the shop floor into a business center of excellence, and propel the company forward as it targets market leadership. Performance efficiencies gained with MES can open up the possibility of increasing output and profitability, all with existing production assets. MES can offer a quick, hassle-free way to turn shop floor operations into a corporate center of excellence.
Tags : 
mes, statistical process control, statistical quality control, manufacturing, technology, manufacturing operations
    
Epicor
Published By: Polycom     Published Date: Nov 30, 2017
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: • Guidance on selecting devices for different workspaces • Information on the newest collaboration features and benefits • Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: Verio     Published Date: Sep 22, 2014
Cloud(n) is an IaaS cloud computing solution that allows better management and more space for your business. Verio’s cloud solution allows SMBs to contain their entire business infrastructure in the cloud. This product makes consolidating much easier, and it can all be done without the hassle of transferring information from one server to another.
Tags : 
verio, cloud, cloud(n), iaas, cloud computing, cloud computing solution, cloud hosting, consolidation, cloud storage
    
Verio
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
In today’s on-demand economy, speed and flexibility are critical. The modern workforce uses multiple devices, expecting them to work seamlessly from any location, at any time. They want to communicate in real time and must have easy access to the data and productivity tools they need to do their jobs well. Office 365 harnesses the power of the cloud to improve the capabilities of the familiar Microsoft Office suite to meet these expectations. It’s a robust productivity toolbox that helps companies transform the way they engage, serve and sell to customers.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: Domino     Published Date: Oct 05, 2018
Industry 4.0 promises a whole host of benefits to food manufacturers — from reduced errors and more uptime to unprecedented visibility into operations at every step in the process. But for many food manufacturers out there, this is uncharted territory. Getting machines of various vintages connected and communicating seamlessly with each other and with existing control systems can seem like an expensive and difficult proposition. Coding and marking is a great place to start for many companies, since SKU proliferation is putting greater demands on packaging lines and introducing additional opportunities for human error. In this brief white paper, Domino examines five key issues with integrating coding and marking systems that often present challenges for food manufacturers along the road to Industry 4.0.
Tags : 
    
Domino
Published By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.