> Technology > Security > SSL
 

SSL

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), its successor, are cryptographic protocols which provide secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same.
Results 1 - 25 of 129Sort Results By: Published Date | Title | Company Name

The Business Value of Extended Validation

White Paper Published By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : 
extended validation certificates, ssl, security, ssl certificate, ev certificate
    
Entrust Datacard

Six Steps to SSL Certificate Lifecycle Management

White Paper Published By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
ssl, ssl certificate, lifecycle management process, ssl digital certificate, application security
    
Entrust Datacard

Entrust’s SSL/TLS Best Practices

White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security
    
Entrust Datacard

A Step-by-Step Migration Guide to SHA-2 SSL Certificates

White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard

Prevent Costly Outages Due to Expired Digital Certificates

White Paper Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction
    
Venafi

New Critical Security Controls Guidelines for SSL/TLS Management

White Paper Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi

Eliminate Blind Spots in SSL Encrypted Traffic

White Paper Published By: Venafi     Published Date: Aug 07, 2015
Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.
Tags : 
eliminate blind spots, ssl, security, security application, anti spam
    
Venafi

Automated threat management: No signature required

White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how to manage automated threats
Tags : 
automated threat management, signature management, data breach investigation, threat detection, threat prevention
    
Vectra Networks

Post-Intrusion Report, June 2015

White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security
    
Vectra Networks

Cybersecurity for power generation and transmission utilities

Case Study Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security
    
Vectra Networks

In-depth Review of APT Attack Methods

White Paper Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks
    
Venafi

New SANS 20 Critical Security Control Requirements

Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction
    
Venafi

SSH attacks are giving APTs unauthorized privileged access

Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection
    
Venafi

Stop Outages Caused by Expired Digital Certificates

Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks
    
Venafi

Addressing NIST and DOD Requirements for Mobile Device Management

White Paper Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security, network security
    
IBM MaaS360

How to Simplify SSL Certificate Management

White Paper Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
ssl
    
Symantec Corporation

Understanding SSL Certificates

White Paper Published By: Thawte     Published Date: Oct 06, 2014
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl certificates, application, web server, sensitive information, customer confidence
    
Thawte

Fraud Alert: New Phishing Tactics—and How They Impact Your Business

White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security
    
Thawte

Securing your Apache Web Server with a Thawte Digital Certificate

White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure.
Tags : 
apache web server, digital certificate, ssl certificate, benefits, ssl
    
Thawte

Securing your Microsoft Internet InformationServices Web Server with a Thawte Digital Certificate

White Paper Published By: Thawte     Published Date: Oct 06, 2014
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
internet security, ssl, customer satisfaction
    
Thawte

The Hidden Costs of Self-Signed SSL Certificates

White Paper Published By: Thawte     Published Date: Oct 06, 2014
Why Self-Signed Certificates are Much Costlier-and Riskier- Than Working with a Trusted Security Vendor.
Tags : 
ssl certificates, self-signed, trusted security vendor, hidden costs, ssl
    
Thawte

Wildcard and SAN: Understanding Multi-Use SSL Certificates

White Paper Published By: Thawte     Published Date: Oct 06, 2014
Leveraging Multi-Use Digital Certificates to Simplify Certificate Management and Reduce Costs.
Tags : 
san, ssl certificates, management, reduce costs, multi-use
    
Thawte

Step Up Encryption with Thawte SGC SuperCerts

White Paper Published By: Thawte     Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
network security, encryption, internet security, ssl
    
Thawte

Choosing a Cloud Provider with Confidence

White Paper Published By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud provider, cloud computing, economic benefits, safeguard information assets, ssl
    
GeoTrust

GeoTrust Enterprise Security Center A New Way to Buy and Easily Manage SSL Certificates

White Paper Published By: GeoTrust     Published Date: Oct 06, 2014
"The business and security benefits of GeoTrust Enterprise Security Center IT departments face a range of issues—some obvious, some more subtle—when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems."
Tags : 
security center, it departments, ssl certificates, security consequences, customer input
    
GeoTrust
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.