ssl technology

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In today’s highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engaged—employees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit today’s mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: Adobe     Published Date: May 25, 2017
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
    
Adobe
Published By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus
    
Avaya
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec, ipsec vpn, comparison, system requirements, aventail
    
Aventail
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Citrix Systems     Published Date: Sep 08, 2011
Citrix NetScaler goes beyond traditional ADCs, taking performance, scalability, reliability and security of critical web applications to the next level. Free white paper explains how!
Tags : 
citrix, netscaler, application performance, service delivery, infrastructure, web applications, tcp, ssl, datastream technology, delivery optimization, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"If you’ve only ever used instructor led training, the idea of moving your learning and development online can seem a little daunting. But cloud-based training can easily make e-learning a reality in your organization; with little hassle and minimal cost. In this eBook ‘Learn to Love the Cloud’, we share our top 7 reasons it makes sense to move your training online, including: • Saving time and money on technology wrangling • Easy access to a huge range of content • Greater data efficiency • Increased learner engagement Grab your copy of Learn to Love the Cloud and see how e-learning can save you time and money, help you be more strategic with your training, and empower your learners to take charge of their professional development. It just makes sense!"
Tags : 
    
Cornerstone OnDemand
Published By: DocuSign UK     Published Date: Aug 08, 2018
"When implementing digital transformation initiatives that incorporate eSignature, organisations need to make sure they do not disrupt business processes and that their solutions work seamlessly with existing technology platforms. Download this eBook to learn how you can enhance your existing tech investments. "
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 10, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
web security, web threats, ssl, secure sockets layer, technology, solution, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
What is it about e-commerce that causes online businesses to fail?Take a look at this E-commerce 101 Guide to help with avoid pitfalls and be successful when selling on the web.
Tags : 
nethawk, geotrust, ecommerce, web security, ssl, online selling, technology, solution, encryption, website owner, ssl certificate, validation, encryption, authentication, security indicators, extended validation, social networking, branching business, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, unified certificates, secure communications, multiple domains, certificates, certificate extensions, secure independence, certificate authority, vital security, business protection, uc environments, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL. In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, web protection, customer protection, attacks, ssl, ev ssl
    
GeoTrust
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
digital experience, ibm digital, digital experience software
    
Group M_IBM Q1'18
Start   Previous   1 2 3    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.