SSL White Papers

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same.
Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
By: GeoTrust     Published Date: Jan 17, 2014

Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more

Tags : web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates
    
By: GeoTrust     Published Date: Jan 17, 2014

In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.

Tags : e-commerce, shopping cart, hosting provider, payment processor, geotrust true, geotrust, ssl certificates, bit encryption
    
By: Thawte     Published Date: Dec 20, 2013

This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.

Tags : code signing certificates, software, security management, ssl
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Thawte     Published Date: Dec 20, 2013

In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.

Tags : apache-ssl, security, security management, ssl
    
By: Thawte     Published Date: Dec 20, 2013

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : server-gated cryptography, security, sgc certificates, security management, ssl
    
By: Blue Coat Systems     Published Date: Aug 12, 2013

There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.

Tags : av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
By: GeoTrust     Published Date: Aug 09, 2013

Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetApp and VMware     Published Date: Jan 09, 2012

This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution.

Tags : unified storage, virtual, infrastructure, leverage, protocol, application, solution, backup
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: ZScaler     Published Date: Nov 16, 2011

The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.

Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
    
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: Thawte     Published Date: Oct 31, 2011

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl
    
By: Thawte     Published Date: Oct 25, 2011

This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.

Tags : ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust
    
By: Thawte     Published Date: Oct 22, 2011

Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.

Tags : san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
    
By: Absolute Software     Published Date: Sep 06, 2011

Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: Thawte     Published Date: Aug 03, 2011

A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.

Tags : ssl, online data transfer, security, authentication, security management
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.