http

Results 51 - 75 of 76Sort Results By: Published Date | Title | Company Name
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https, tls/ssl, vulnerability management, sensitive information, hackers
    
VeriSign, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi, wi-fi, tls, protect
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Symantec     Published Date: Oct 02, 2012
Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
Tags : 
ssl, firesheep, sidejacking, http connections, tls, ssl, symantec
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : 
firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : 
ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection
    
Symantec
Published By: CradlePoint     Published Date: May 17, 2016
This global corporation of quick service restaurants has about 17,500 locations serving millions of customers each day with concepts including popular pizza, chicken, and Tex-Mex chains. Most of the restaurants are on a wired network with Cisco routers, the main function of which is to process credit card purchases. With so many transactions taking place every day, the corporation decided to invest in a wireless failover system to guarantee uninterrupted connection. After careful consideration, the corporation chose Cradlepoint to provide “four-nines” (99.99% or better) connectivity via 3G/4G/LTE or wireless backup. - See more at: https://cradlepoint.com/success_stories/quick-service-restaurant-chain#sthash.ODr3J5uT.dpuf
Tags : 
    
CradlePoint
Published By: Symantec     Published Date: Oct 01, 2015
To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Tags : 
https-secured sites, seo, google ranking
    
Symantec
Published By: BMC Software     Published Date: Feb 12, 2014
Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Please enjoy a video preview of this white paper here: http://www.bmc.com/videos/solution-videos/itsm-ema-white-paper.html Get the free white paper from Enterprise Management Associates.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, bmc
    
BMC Software
Published By: Citrix Systems     Published Date: Jun 13, 2019
https://technews.onlinetechreports.com/Technews/Citrix-RealizeJAP.html
Tags : 
    
Citrix Systems
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication, encryption, sgc, http
    
VeriSign, Inc.
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-ManagingJAP.html
Tags : 
    
Citrix Systems
Published By: The SAVO Group     Published Date: Jun 14, 2013
Many marketers are aware of the sobering statistic that up to 90% of content created for sales support is ignored by the field and more than 74% of sellers re-write/create their own sales collateral. Watch this on-demand webinar to get tips for creating and delivering content when and where your sales team needs it most.
Tags : 
savo group, on-demand webinar, volocity, visibility, control, sales support
    
The SAVO Group
Published By: Zoom     Published Date: Apr 06, 2016
Solar City provides a customer testimonial detailing how Zoom was able to help reduce executive travel costs, increase efficiency, and expand nationally and internationally. Learn more about Zoom today at http://zoom.us/
Tags : 
zoom, solar city, video conferencing, zoom rooms, conference systems
    
Zoom
Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony, internet security, firewall, firewalls, ingate, ingate systems
    
Ingate Systems
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats, threat vectors, service platforms, mitigation
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : 
ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search, storage, service
    
IBM Software
Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Start   Previous    1 2 3 4    Next    End
Search Resource Library