ssl

Results 326 - 350 of 636Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Online visitors need reassurance that they are on a safe on the sites they visit.  One way to give them this reassurance is to display trust marks on your site. Learn more today!
Tags : 
verisign, trust, seal, trust mark, ssl, security
    
VeriSign Incorp.
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to properly manage your certificates and receive the 7 steps for migrating from your 1024-bit RSA to stronger SSL certified key lengths.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud
Published By: Asure Software     Published Date: Mar 04, 2014
Learn how to simplify your workplace and create an environment that fosters collaboration and allows employees to seamlessly work from home or in the office.
Tags : 
human resources, hot desking, hoteling, workspace strategies, desk hoteling, asure software, knowledge management, human resource technology
    
Asure Software
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"If you’ve only ever used instructor led training, the idea of moving your learning and development online can seem a little daunting. But cloud-based training can easily make e-learning a reality in your organization; with little hassle and minimal cost. In this eBook ‘Learn to Love the Cloud’, we share our top 7 reasons it makes sense to move your training online, including: • Saving time and money on technology wrangling • Easy access to a huge range of content • Greater data efficiency • Increased learner engagement Grab your copy of Learn to Love the Cloud and see how e-learning can save you time and money, help you be more strategic with your training, and empower your learners to take charge of their professional development. It just makes sense!"
Tags : 
    
Cornerstone OnDemand
Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations, business technology
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, infrastructure
    
Symantec
Published By: MarkLogic     Published Date: May 16, 2017
Getting data from today’s television and film production and post-production workflows may seem like you’re moving through molasses. Mired in manual processes, attempting to manage and automate data during the creation stage of your content’s lifecycle can sometimes feel like a losing battle as the demands of creatives constantly move forward. Hear Lulu Zezza, Physical Production Executive for New Regency Productions, Matt Turner, Media & Entertainment CTO, MarkLogic, and Guy Finley, Executive Director, Media & Entertainment Strategic Alliance (MESA) as they discuss: o Metadata’s value and its evolution, beyond delivery and experiences, to harnessing critical production data o Results of taking a new approach to bring this data together with context and meaning that impacts other business unit roles o How the New Regency team created a software driven production data hub that is enabling creatives to work seamlessly on the project, in a comfortable UI/UX driven environment, with e
Tags : 
    
MarkLogic
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
    
KEMP Technologies
Published By: Thawte     Published Date: Jan 19, 2016
Le choix de l’autorité de certification émettrice de votre certificat SSL s’avère presque aussi crucial que le type de certificat que vous déployez. Quelle que soit la formule pour laquelle vous optez, une autorité de certification de la réputation de Thawte, leader historique de la sécurité en ligne, renforcera votre crédibilité auprès des visiteurs de votre site.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Oct 05, 2015
Les certificats SSL de validation de domaine (DV), d’entité (OV) et étendue (EV) offrent des niveaux d’authentification complètement différents. Mais comment cela se traduit-il dans les faits En pratique, le certificat adapté à vos besoins dépendra de votre type d’activité et de l’utilisation que vous en ferez. Pour découvrir le niveau de validation qu'il vous faut, téléchargez vite notre guide de référence rapide.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
Les certificats SSL de validation de domaine (DV), d’entité (OV) et étendue (EV) offrent des niveaux d’authentification complètement différents. Mais comment cela se traduit-il dans les faits En pratique, le certificat adapté à vos besoins dépendra de votre type d’activité et de l’utilisation que vous en ferez. Pour découvrir le niveau de validation qu'il vous faut, téléchargez vite notre guide de référence rapide.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte
Published By: Virtela Communications, Inc.     Published Date: Nov 30, 2009
This paper will show you how to prepare your network to support your business when these unexpected events arise.
Tags : 
managed servicesssl vpn, remote access, cloud, pandemic, global wa, virtela
    
Virtela Communications, Inc.
Published By: Efficient Technology, Inc.     Published Date: Mar 07, 2011
Seamlessly integrating e-signature into the sales order process will result in dramatic cost savings, improve client preception and enable organizations to scale their sales operations more effectively.
Tags : 
sales order process, manage forms library, integrate e-sign forms, data capture, custom web application, efficiency expert, automate paperwork, process design, eliminate errors, go paperless.
    
Efficient Technology, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents, keyloggersmalvertising, trojan horse, extended validation, ev ssl certficates, botnet, denial of service, cybercriminals
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Prevent unexpected downtime with reliable failover protection. We interrupted access both local storage arrays - the Dell EMC database host seamlessly redirected all I/O to remote VMAX 250F with Intel® Xeon® Processor via SRDF/Metro with no interruption of service or downtime. The 3PAR solution crashed until the standby paths became active and we restarted the VM.
Tags : 
    
Dell PC Lifecycle
Published By: Symantec Corporation     Published Date: Mar 21, 2014
Best practices for maintaining the security of sensitive enterprise transactions.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 18, 2014
This white paper will present the lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, why poor management is potentially dangerous to the enterprise, and how the right SSL certificate management tool can help enterprises keep track of and manage SSL certificates more effectively.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : 
shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication, webtrust auditors, internet explorer 7, ie7, green address bar, security status bar, verisign secured seal, phishing, ev upgrader, verisign, verisign, verisign, ssl
    
VeriSign Incorp.
Published By: Memphis CVB     Published Date: Sep 27, 2016
Put us to the test. We’re used to the spotlight and will work tirelessly to ensure your time in Memphis makes you a superstar with your clients.
Tags : 
    
Memphis CVB
Published By: Juniper Networks     Published Date: Jun 22, 2017
In today’s technology-driven world, a financial services organization’s ability to evolve the business quickly depends on the network. MetaFabric architecture, which is the foundation of Juniper’s unique end-to-end data center networking solution, helps financial services firms respond confidently to whatever happens in the market. With an open, simple, and smart network in place, organizations can adapt quickly and seamlessly to changing requirements while eliminating the disruptions of forced upgrades and unnecessary purchases that come with vendor lock-in. Most importantly, the MetaFabric architecture helps companies stay at the forefront of innovation, keeping them one step ahead of the competition.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: GeoTrust     Published Date: Jan 21, 2016
La sécurité SSL n’est pas une question de certificats « sécurisés » ou « non sécurisés ». En revanche, les certificats SSL se distinguent par les niveaux de confiance qu’ils inspirent aux internautes. L’objectif de ce document est de vous aider à choisir le niveau de validation adapté à votre entreprise.
Tags : 
    
GeoTrust
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept