ev certificate

Results 76 - 92 of 92Sort Results By: Published Date | Title | Company Name

Business Continuity And Breach Protection

Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec

Hidden Dangers Lurking in E-Commerce - Reducing Fraud with the Right SSL Certificate

Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security, security
    
Symantec

Frost & Sullivan Analyst Paper, 'Six Golden Rules for Selecting an SSL Certificate'

Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec

Code Signing Best Practice Guide

Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers, security
    
Symantec

Securing Microsoft Exchange 2010

Published By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, security, data management, business technology
    
Thawte

Server-Gated Cryptography: providing better security for more users

Published By: Thawte     Published Date: Aug 08, 2013
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, networking, security, data management, business technology
    
Thawte

Extended Validation SSL Certificates

Published By: Thawte     Published Date: Aug 08, 2013
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, validation, visibility, authentication, security, web browsers, enterprise applications, data management, business technology
    
Thawte

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric

Microsoft Certified Systems Engineer (MCSE) Certificate

Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional, it career advancement, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
Kaplan, Inc.

Microsoft Certified Systems Administrator (MCSA) Certificate

Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional, it career advancement, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
Kaplan, Inc.

How to win customers and build trust online

Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority, identity and authentication, authentication, identity management, network security certification, software development certification
    
VeriSign

SSL Validation

Published By: Thawte     Published Date: Oct 05, 2015
Domain Validation (DV), Organisation Validation (OV) and Extended Validation (EV) SSL certificates offer completely different levels of authentication - but what does that mean? The right certificate for you depends on your business type and what you are using the certificate for. To discover which level of validation wins for your needs, download our quick reference guide now.
Tags : 
    
Thawte

Extended Validation SSL Certificates

Published By: Thawte     Published Date: Dec 29, 2015
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance.
Tags : 
ssl, best practices, business intelligence, business management, cloud computing
    
Thawte

Step Up Encryption with Thawte SGC SuperCerts

Published By: Thawte     Published Date: Dec 29, 2015
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
encryption, sgc certificates, browser, security management, web service security, business intelligence
    
Thawte

The High Cost of Poor Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert

The Key to Smarter Enterprise Security

Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deployments—and failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert

Revealing the secret life of your Code Signing certificates

Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.