SSL Research
-
Securing Microsoft Exchange 2010 with VeriSign Authentication Services
Sponsored by: VeriSign EMEAThis guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
-
Best practices for implementing 2048-bit SSL
Sponsored by: CitrixTo maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler.
-
Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL
Sponsored by: BlueCoatView this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more.
-
The Evolving Threat Landscape
Sponsored by: Juniper Networks, Inc.This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
-
Protecting User from Firesheep and Sidejacking Attacks with SSL
Sponsored by: VeriSign EMEAThis paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
-
Simplifying management and lowering total cost of ownership for SSL certificates
Sponsored by: GlobalSignThis white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.
-
GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
Sponsored by: GlobalSignThis paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
-
GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Sponsored by: GlobalSignThis white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
-
SuperMassive E10000 Series Next-Generation Firewall
Sponsored by: SonicWALLThe SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds.
-
How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online
Sponsored by: VeriSign EMEAIf you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
-
Achieving Security With Cloud PC Backup
Sponsored by: Iron MountainThis document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
-
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Sponsored by: VeriSign AustraliaThis paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
-
The Application Usage and Risk Report
Sponsored by: Palo Alto NetworksThe latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
-
Solution Brief: Accelerating SSL Applications Across the WAN
Sponsored by: BlueCoatSecure Sockets Layer (SSL) is the industry-standard protocol for establishing a secure communications link when transmitting information over untrusted networks. However, SSL can create complications when it comes to prioritizing, optimizing, and accelerating network traffic. This paper outlines a solid strategy for optimizing SSL applications.
-
IT Decision Checklist: Remote Access
Sponsored by: VirtualArmorThe pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
-
Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
Sponsored by: TechTarget Search Windows ServerIn this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
-
Web Services Security: What's Required to Secure a Service-Oriented Architecture
Sponsored by: Oracle CorporationThis white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
-
Dell and Microsoft Windows Server 2008
Sponsored by: DellEMC and Intel®Windows Server 2008 is designed to provide increased reliability and control over your server infrastructure.
-
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
Sponsored by: VeriSign EMEAA multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
-
Emerging Multicast VPN Applications
Sponsored by: Juniper Networks, Inc.This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
-
Keys to SAP Application Acceleration: Advances in Delivery Systems
Sponsored by: CitrixIt is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
-
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
Sponsored by: Cisco Systems, Inc.This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.