dom

Results 551 - 575 of 720Sort Results By: Published Date | Title | Company Name

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Security Options

Published By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security, infrastructure
    
Symantec

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, authentication
    
Symantec

Internet Trust Marks: Building Confidence and Profit Online

Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Symantec

Licensing Symantec Certificates: Securing Multiple Web Server and Domain Configurations

Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Symantec

Reducing the Cost and Complexity of Web Vulnerability Management

Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Symantec

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security, infrastructure
    
Symantec

Securing Microsoft Exchange 2010 with Symantec SSL Certificates: Best Practices

Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, application integration, application performance management, best practices, business integration, business intelligence, business management
    
Symantec

Spoofing Server-Server Communication How You Can Prevent It

Published By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security, infrastructure
    
Symantec

Licensing Symantec Certificates

Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations, business technology
    
Symantec

The Big Data Mystique: Business Analytics for Every Business

Published By: IBM     Published Date: Oct 30, 2014
Filled with exotic terms like “Hadoop” and “Data Scientist”, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses what’s really important when it comes to Big Data – and what businesses can do now to capitalize on the trend.
Tags : 
business analytics, big data, bi/ba, it management, knowledge management, data management, best practices
    
IBM

Reduce the Cost & Complexity of Backup

Published By: IBM     Published Date: Nov 04, 2014
Dominate trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amount of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
it trends, virtual environments, core application, data protection, networking, security, virtualization
    
IBM

Reduce the Cost & Complexity of Backup

Published By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : 
it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
    
IBM

The Importance of DMARC in Email Delivery

Published By: Dyn     Published Date: Sep 25, 2013
Domain-based Message Authentication, Reporting & Conformance (DMARC) has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name. Read this whitepaper to learn the importance of DMARC and what it does for you.
Tags : 
dmarc, domain based message authentication, reporting comfirmation, authenticate sends, isp, internet service provider, dyn, network security, authentication, email security, phishing, secure content management
    
Dyn

Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols

Published By: Comcast Business     Published Date: Oct 17, 2013
Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, networking
    
Comcast Business

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Nov 18, 2015
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, zk research, infrastructure, hybrid wan, networking
    
Cisco

Cloud must-haves for developers

Published By: Cisco     Published Date: Jan 05, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
    
Cisco

Infographic: Cloud Must-Haves for Developers

Published By: Cisco     Published Date: Apr 15, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
cloud management, cloud services, cloud management, best practices, business intelligence, business management, business metrics, content integration, content management system, productivity
    
Cisco

10 essential elements for a secure enterprise mobility strategy

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data, mobile workers, smart phones, wireless phones, data protection, secure content management, mobile device management
    
Citrix Systems, Inc.

Improving Collaboration by Adding Social Capabilities to Email

Published By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
ibm, collaboration, email communication, real time communication, business communication, social software
    
IBM

The Business Value of DDoS Protection

Published By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : 
ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation, ddos attacks, anti virus, ddos, risk management, colocation and web hosting
    
Arbor Networks

An Email Marketing Delivery Report for 2010: Yahoo, Hotmail, AOL & Gmail

Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email, inbox, spam, dkm, engagement
    
EmailDirect

Stress Testing: A View from the Trenches

Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security, it management, knowledge management, enterprise applications, platforms, data management
    
SAS

A New Breed of BI: Self-Service Analytics That Your Business and IT Users Will Love

Published By: SAS     Published Date: Apr 25, 2017
But if you can’t explain how you got the answer, or what it means, it’s no good. Most self-service BI solutions can only display what has already happened, through reports or dashboards. And most have a predefined path of analysis that gives users very little creative freedom to explore new lines of thought. To maintain competitive advantage, your BI solution should allow business users to quickly and easily investigate and interrogate the data to find out why something happened – to uncover the root cause behind the “what.”
Tags : 
    
SAS

Top 12 Best Practices for Virtualizing Active Directory Domain Controllers

Published By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : 
veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields, vmware, vexpert, virtualizing, active directory, infrastructure, storage virtualization, application integration, application performance management, business integration, business management, productivity, data center design and management
    
Veeam
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.