certificate

Results 251 - 275 of 296Sort Results By: Published Date | Title | Company Name
Published By: Thawte     Published Date: Aug 08, 2013
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption
    
Thawte
Published By: Thawte     Published Date: Aug 08, 2013
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology
    
Thawte
Published By: Thawte     Published Date: Aug 08, 2013
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, validation, visibility, authentication, security, web browsers
    
Thawte
Published By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption
    
Thawte
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance
    
Cenzic
Published By: SpringCM     Published Date: Dec 06, 2006
On behalf of CHEMCENTRAL, SpringCM manages more than 1.2 million documents — growing by more than 50,000 new documents each month — such as Material Safety Data Sheets (MSDS), Certificates of Analysis (CoA), product updates, proofs of delivery, price letters, and invoices.
Tags : 
document management, case study, chemical, product information, product information management, pim, msds, product safety information
    
SpringCM
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication
    
Arcot
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional
    
Kaplan, Inc.
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional
    
Kaplan, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code
    
GlobalSign
Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority
    
VeriSign
Published By: GlobalSign     Published Date: Mar 18, 2011
Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
Tags : 
malware monitoring, ssl certificates, hosting, web hosts, isp's, integrators, partner program, globalsign
    
GlobalSign
Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jun 28, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
ssl certificates, online security, dats encryption
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Android is on the rise. In a 2011 study, Distimo found that the Android Market (now known as Google Play) eclipsed the Apple App Store in terms of free apps, with 134,342 apps compared to Apple's 121,845.
Tags : 
android, applications, htc, apple, ios, samsung, secure, code
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Build Trusted Relationships with Software Users
Tags : 
symantec, code, adobe, certificates, software
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
mobile app market, securing, code, signing, certificates
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
symantec, web server, domain configurations, commerce
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library