SSL

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same.
Results 51 - 75 of 130Sort Results By: Published Date | Title | Company Name
By: NetApp and VMware     Published Date: Jan 09, 2012
This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution.
Tags : unified storage, virtual, infrastructure, leverage, protocol, application, solution, backup
     NetApp and VMware
By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
     Okta
By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
     Okta
By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
     LogRhythm
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
     ZScaler
By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
     Thawte
By: Thawte     Published Date: Nov 08, 2011
Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
     Thawte
By: Thawte     Published Date: Oct 31, 2011
Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
     Thawte
By: Thawte     Published Date: Oct 25, 2011
This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Tags : ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust
     Thawte
By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
     Thawte
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : verisign, health, ehr, security, breaches, risks, web-based, information
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : best, practices, applications, tls, ssl, secure, business computing, transport layer security
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents
     VeriSign Authentication Services, now a part of Symantec Corp.
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
     VeriSign, Inc.
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
     VeriSign, Inc.
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.