shortcut guide

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name

The Shortcut Guide to IT Service Management and Automation

Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management

The Shortcut Guide to Achieving Business Intelligence in Midsize Companies

Published By: IBM Software     Published Date: Feb 07, 2011
See what BI can do for your company in this complete four-chapter Shortcut Guide to BI success. Learn practical, affordable tips for creating or expanding your BI strategy.
Tags : 
ibm cognos express, midsize companies, business intelligence, data mining, data warehouse, reporting, business management, data warehousing
    
IBM Software

e-Book: The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
This 45-page e-Book gives you the tools you need to detect security vulnerabilities, build an information security strategy, and plan your investment in security technology.
Tags : 
verisign, phishing, extended validation, ev ss, ssl, encryption, online safety, online security
    
VeriSign Incorp.

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.

The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec

The Shortcut Guide to Business Security Measures Using SSL

Published By: Symantec     Published Date: Jan 10, 2013
In this guide, we will examine major types of threats to information security that  businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
shortcut, business, security measures, ssl, security socket layer, ssl, data management, business technology
    
Symantec

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec     Published Date: Jan 11, 2013
Threats to web application are becoming increasing complex - from malware and advanced persistent threats to data leaks. This guide is made to address your needs and provides a step by step to assess your security needs.
Tags : 
ssl, web application, shortcut guide, web application threats, shortcut guide, symantec, security, it management
    
Symantec

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : 
information security, information technology, web applications, security, web service security, business technology
    
Symantec

The Shortcut Guide to Business Security Measures Using SSL

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

The Shortcut Guide to Business Security Measures Using SSL

Published By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Business Security Measures Using SSL
Tags : 
realtime, symantec, ssl, security measures, technology, business technology
    
Symantec

The Shortcut Guide to Protecting Against Web Application Threats Using SSL

Published By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Protecting Against Web Application Threats Using SSL
Tags : 
web application, threats, ssl, cybersecurity, business technology
    
Symantec
Search      

Add Research

Get your company's research in the hands of targeted business professionals.