certificate security

Results 76 - 100 of 102Sort Results By: Published Date | Title | Company Name
Published By: Thawte     Published Date: Oct 06, 2014
Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor.
Tags : 
ssl certificates, self-signed, trusted security vendor, hidden costs
    
Thawte
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to leverage multi-use digital certificates to simplify certificate management and reduce your organization’s costs.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
Best-of-breed SSL certificates reassure businesses and customers about the security and the ease of conducting transactions over the Internet. Ideally, SSL Certificates form an integral part of a company's overall IT strategy.
Tags : 
ssl certificates, business and customer security, it strategy, privacy and safety
    
Symantec
Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers
    
Symantec
Published By: Thawte     Published Date: Aug 08, 2013
Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor. Download this white paper for more information.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, knowledge management, data management, business technology
    
Thawte
Published By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, data management, business technology
    
Thawte
Published By: Thawte     Published Date: Aug 08, 2013
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, validation, visibility, authentication, security, web browsers, data management, business technology
    
Thawte
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance
    
Cenzic
Published By: Symantec     Published Date: Jun 28, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
ssl certificates, online security, dats encryption
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security, business technology
    
Symantec
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Start   Previous    1 2 3 4 5    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.