authority

Results 51 - 75 of 86Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc
    
VeriSign Incorp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
    
Attivio
Published By: ScriptLogic     Published Date: Jan 11, 2012
This paper outlines the potential cost and energy savings available when effective power management is exercised across the client computers.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic
Published By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to manage permissions across hundreds of servers. Learn more and read on.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration
    
Quest Software
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, learn about the benefits - and hazards - of email migration. Then, discover the importance of a solid migration strategy, and get several pre-migration steps critical to your project's success. Read this paper today.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
Quest Software
Published By: Quest Software     Published Date: Apr 19, 2012
In this four-part eBook, get a better understanding of the real-world issues associated with IT compliance, how they affect the business, and how you can simplify your compliance challenges. Get your copy today.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration
    
Quest Software
Published By: Quest Software     Published Date: Apr 27, 2012
Is your business reactively implementing compliance? You're wasting time and money - get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration
    
Quest Software
Published By: DocuSign     Published Date: Feb 13, 2017
Procurement authority Jack Miles believes that digital and mobile platforms are the fast ticket to quick and efficient workflows in business. Watch this short video to learn more.
Tags : 
    
DocuSign
Published By: GeoTrust     Published Date: Jan 21, 2016
Almost every website involves some exchange of information, whether it’s login details for an online application or contact details on a landing page, and visitors want to know that their information is secure. So deploying an SSL certificate from a trustworthy certificate authority (CA) like GeoTrust is a must for any site owner.
Tags : 
    
GeoTrust
Published By: Thawte     Published Date: Jan 19, 2016
Download this visual reference guide to see why a highly reputable certificate authority like Thawte, the original international specialist in online security, gives you the credibility that your customers are looking for when assessing your website, no matter what sort of SSL certificate you choose.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Jan 19, 2016
In „Erste Schritte mit Thawte SSL/TLS“ erläutern wir in leicht verständlicher Form, wie SSL/TLS diese Vertrauenswürdigkeit herstellt und warum nicht alle SSL/TLS-Zertifikate und die ausstellenden Zertfizierungsstellen (Certificate Authority, CA) gleich sind.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
Thawte
Published By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication
    
Thawte
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Jan 17, 2014
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more
Tags : 
web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates
    
GeoTrust
Published By: GeoTrust     Published Date: Jan 17, 2014
In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.
Tags : 
e-commerce, shopping cart, hosting provider, payment processor, geotrust true, geotrust, ssl certificates, bit encryption
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities
    
GeoTrust
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
symantec, stuxnet, cyber-attack, security, certificate authority
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
    
Quocirca
Start   Previous    1 2 3 4    Next    End
Search Resource Library