ssl

Results 151 - 175 of 637Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: IBM     Published Date: Jan 17, 2017
IBM Commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly and seamlessly.
Tags : 
ibm, commerce, forrester, digital experience
    
IBM
Published By: NETIQ     Published Date: Jan 12, 2017
In organizations, employees are walking around with powerful mobile devices in their pockets, and so are their partners and customers. Enable users so they can work securely and seamlessly.
Tags : 
    
NETIQ
Published By: Frontier Communications     Published Date: Dec 22, 2016
It is often hard for owners to ensure a business with geographically diverse locations run seamlessly as a unified company. This is especially true as there are a number of trends emerging that complicate the task of running a business that has multiple locations. At the same time, there are technologies and capabilities than can help your business and staff create an integrated work environment. This ebook will examine a variety of solutions that can make it easy for staff to work across all of your business locations, helping to make your business run more efficiently and providing your staff with the tools they need to be more productive.
Tags : 
    
Frontier Communications
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : 
extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
ssl, ssl certificate, lifecycle management process, ssl digital certificate
    
Entrust Datacard
Published By: IBM     Published Date: Nov 15, 2016
IBM Commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes and culture to create digital customer experience in real time.
Tags : 
ibm, watson, commerce, watson content hub, digital experience, customer experience
    
IBM
Published By: Dell EMC     Published Date: Nov 08, 2016
Dell EMC Unity, powered by Intel® Xeon® processors, delivers the ultimate in All-Flash storage simplicity and value to speed deployment, streamline management and seamlessly extend the data storage to the cloud. Unity’s All-Flash platform is simple, modern, exible, and aordable—easy to setup and manage, optimized SSD performance and eciency, includes multiple deployment options, and comes with cloud-enabled storage management to keep you connected.
Tags : 
ssd, storage, cloud, management, flash optimization, scalability
    
Dell EMC
Published By: Entrust Datacard     Published Date: Oct 17, 2016
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Tags : 
    
Entrust Datacard
Published By: IBM     Published Date: Oct 17, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately. Join IBM's open source community and instantly boost your predictive analytics.
Tags : 
ibm, analytics, open source, spss, stats, modeler, predictive analytics
    
IBM
Published By: Adobe     Published Date: Oct 10, 2016
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe stock, adobe creative cloud, cloud, integration, traditional marketing
    
Adobe
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
Published By: Memphis CVB     Published Date: Sep 27, 2016
Put us to the test. We’re used to the spotlight and will work tirelessly to ensure your time in Memphis makes you a superstar with your clients.
Tags : 
    
Memphis CVB
Published By: IBM     Published Date: Sep 26, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately.
Tags : 
ibm, ibm spss, open source, statistics, modeler, open source community
    
IBM
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security
    
F5 Networks Inc
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Sales Benchmark Index     Published Date: Aug 03, 2016
This workbook is for executive leadership teams inside of companies with aggressive revenue growth goals, who have a lot on the line, and can’t afford to waste time.
Tags : 
executive leadership, revenue goal, sales, best practices, growth
    
Sales Benchmark Index
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.