SSL

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same.
Results 51 - 75 of 130Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password, access control, application security, business continuity, compliance, ddos, disaster recovery, email security, internet security, intrusion detection, intrusion prevention, ipsec
     Okta
By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password, access control, application security, email security, encryption, firewalls, intrusion detection, intrusion prevention, password management, ssl, application integration, application performance management
     Okta
By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security, privileged users, damage, infrastructure, backup and recovery, access control, application security, auditing, authentication, disaster recovery, email security, encryption, high availability
     LogRhythm
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml, access control, anti spam, application security, encryption
     ZScaler
By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust, authentication, phishing, security management, security policies, ssl, web service security, vulnerability management
     Thawte
By: Thawte     Published Date: Nov 08, 2011
Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage, cloud security, cloud solutions, geotrust, geo trust, geotrust.com, verisign; verisign.com, verisign inc, symantec, symantec.com, symantec corporation, internet security, network security appliance
     Thawte
By: Thawte     Published Date: Oct 31, 2011
Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl, geo trust, geotrust, access control, application security, authentication, security management, web service security, vulnerability management
     Thawte
By: Thawte     Published Date: Oct 25, 2011
This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Tags : ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust, geo trust, internet security, intrusion detection, intrusion prevention, security management, security policies
     Thawte
By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication, encryption, x.509, geotrust, ssl, web service security, vulnerability management
     Thawte
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : verisign, health, ehr, security, breaches, risks, web-based, information, patient, privacy, confidential, protect, security, healthcare industry, access control, application security, authentication, business continuity, disaster recovery, identity management
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal, anti virus, application security, security management, security policies, ssl, vulnerability management
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents, keyloggersmalvertising, trojan horse, extended validation, ev ssl certficates, botnet, denial of service, cybercriminals, access control, email security, hacker detection, internet security, security policies
     VeriSign Authentication Services, now a part of Symantec Corp.
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
     Absolute Software
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication, symantec, access control, security management, security policies, ssl
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access, authentication, encryption, disaster recovery, ssl
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https, tls/ssl, vulnerability management, sensitive information, hackers, access control, authentication, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft, fraud, authentication, encryption, hacker detection, identity management, internet security, security policies, ssl
     VeriSign, Inc.
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.