symantec

Results 301 - 325 of 583Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, cloud security, enterprise, regulatory compliance, data segregation, data recovery, business technology
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Choosing the Right Security Solution. Moving Beyond SSL to Establish Trust
Tags : 
ssl, symantec, safeguard customers, third-party solutions, security, business technology
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Company or not, it is important that you approach your security meticulously. This Symantec guide will de-mistify the technology and give you the information you need to make the best decision when considering your online security options.
Tags : 
secure socket layers, security, symantec, online security, data management, business technology, data center
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking, security, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has went from "if" to "when". This white paper is aimed to help enterprises making decisions on where and when to implement cloud.
Tags : 
cloud hosting providers, cloud, hosting, security, implementing cloud, networking, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : 
firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections, security, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Security attacks happen too often; recently, an attack on AT&T resulted in 120,000 identities being stolen. Organizations need to focus on security efforts to prevent breaches. Read to learn about reducing cost and complexity of preventing attacks.
Tags : 
web vulnerability management, complexity of web, reducing costs, attacks, identity theft, management, security, it management, enterprise applications, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
This paper explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption that address problems.
Tags : 
security and trust of doing business, business, trust, consumer confidence, consumer trust, security, it management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of the enterprise networks and breaches of data security. Read on to learn more about how you can prevent spoofing server to server.
Tags : 
spoofing, communications, how to prevent, s2s, preventing spoofing, new attacks, security threats, symantec, it security, it threats, security, it management, enterprise applications, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
In this guide, we will examine major types of threats to information security that  businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
shortcut, business, security measures, ssl, security socket layer, ssl, data management, business technology, data center
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
Threats to web application are becoming increasing complex - from malware and advanced persistent threats to data leaks. This guide is made to address your needs and provides a step by step to assess your security needs.
Tags : 
ssl, web application, shortcut guide, web application threats, shortcut guide, symantec, security, it management, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security, business technology, data center
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
When you employ services on the internet, SSL certificates are the industry standard for authentication and security. Depending on how you plan to use SSL certificates, they can provide greater flexibility that traditional certificates.
Tags : 
ssl certificates, multi-use, san, wildcard, security, it management, business technology
    
Symantec
Published By: Cisco     Published Date: Sep 17, 2015
Symantec Delivering on Its Strategic Vision with Next-Generation Secure Datacenter Powered by Cisco ACI
Tags : 
datacenter, aci, enterprise, networking
    
Cisco
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : 
verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft, fraud, ssl certificate, online retailers, insurance brokers, online pharmacy, financial services, travel, education, banking, verisign ev ssl certificates, www.verisign.c
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents, keyloggersmalvertising, trojan horse, extended validation, ev ssl certficates, botnet, denial of service, cybercriminals
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.