SSL White Papers

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same.
Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
By: Symantec Corporation     Published Date: Jul 11, 2014

View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Symantec Corporation     Published Date: Jul 11, 2014

Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.

Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
By: Citrix     Published Date: Apr 16, 2014

Read how Citrix NetScaler 10, the latest version of one of the industry’s most respected ADCs, is the first such appliance to support active-active clustering.

Tags : adc, citrix, netscaler, clustering, ssl, load balancing, data center, racks
    
By: GeoTrust     Published Date: Jan 17, 2014

Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more

Tags : web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates
    
By: GeoTrust     Published Date: Jan 17, 2014

In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.

Tags : e-commerce, shopping cart, hosting provider, payment processor, geotrust true, geotrust, ssl certificates, bit encryption
    
By: Thawte     Published Date: Dec 20, 2013

This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.

Tags : code signing certificates, software, security management, ssl
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Thawte     Published Date: Dec 20, 2013

In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.

Tags : apache-ssl, security, security management, ssl
    
By: Thawte     Published Date: Dec 20, 2013

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : server-gated cryptography, security, sgc certificates, security management, ssl
    
By: Blue Coat Systems     Published Date: Aug 12, 2013

There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.

Tags : av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
By: GeoTrust     Published Date: Aug 09, 2013

Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetApp and VMware     Published Date: Jan 09, 2012

This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution.

Tags : unified storage, virtual, infrastructure, leverage, protocol, application, solution, backup
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.