encryption

Results 251 - 275 of 342Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : 
inmage, practical business protection, dr-scout, continuous data protection, cdp, encryption support, host-agents, control servers, data management
    
InMage
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains risky data from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if its hacked or suffers a breach causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSkys Email DLP is powered by IBM technology. Download SilverSkys Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption, business technology
    
SilverSky
Published By: McAfee     Published Date: Nov 06, 2013
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
mcafee, endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
    
Symantec
Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva
Published By: Symantec     Published Date: Jan 10, 2013
This paper explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption that address problems.
Tags : 
security and trust of doing business, business, trust, consumer confidence, consumer trust, security, it management, business technology
    
Symantec
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterdays news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is toas quickly as possibledetect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
    
Symantec
Published By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organizations enterprise data.
Tags : 
nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption, data security, user experience, enterprise mobile applications
    
Nativeflow
Published By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat
    
Kaspersky
Published By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : 
cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack
    
Kaspersky
Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, enterprise applications, data management, business technology, data center
    
Smarsh
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, networking, enterprise applications, storage
    
Smarsh
Published By: Thawte     Published Date: Oct 22, 2011
Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
san certificate, subject alternative name certificates, ucc, unified communications certificate, ssl certificates, ssl security, certificate authority, authentication, encryption, x.509, geotrust
    
Thawte
Published By: Thawte     Published Date: Oct 31, 2011
Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl, geo trust, geotrust
    
Thawte
Published By: GeoTrust     Published Date: Aug 09, 2013
What is it about e-commerce that causes online businesses to fail?Take a look at this E-commerce 101 Guide to help with avoid pitfalls and be successful when selling on the web.
Tags : 
nethawk, geotrust, ecommerce, web security, ssl, online selling, technology, solution, encryption, website owner, ssl certificate, validation, encryption, authentication, security indicators, extended validation, social networking, branching business, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Jan 17, 2014
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why theyre important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more
Tags : 
web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates, bit encryption, web security, ssl security, ssl provider, certificate authority, bit encryption
    
GeoTrust
Published By: GeoTrust     Published Date: Jan 17, 2014
In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services youll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.
Tags : 
e-commerce, shopping cart, hosting provider, payment processor, geotrust true, geotrust, ssl certificates, bit encryption, web security, ssl security, ssl provider, certificate authority, bit encryption
    
GeoTrust
Published By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : 
ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security, security, business technology
    
Symantec
Published By: Thawte     Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
    
Thawte
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com