keys

Results 176 - 192 of 192Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec
Published By: AtTask     Published Date: Feb 11, 2012
It really doesn't matter if you are leading an army into battle or a product into market, sometimes the best solutions seem counter-intuitive. The same is true with project management. This document will safeguard your success.
Tags : 
project management mistakes, project management failures, it project failures, project failure statistics, project failure reasons, project failure examples, reasons for project failure, project failure rates, project failure case study, project estimation techniques, knowledge management
    
AtTask
Published By: Crowdtap     Published Date: Jul 03, 2012
New from Crowdtap, learn why influence is the hottest topic in marketing and social media. We'll show you how to tap your brand's peer influencers to drive advocacy and boost word-of-mouth online and off with 5 Keys to Success in Influencer Marketing.
Tags : 
influence, influencer, influence marketing, influencer marketing, influence score, social marketing, social roi, social media, word-of-mouth, wom, word-of-mouth marketing, wom marketing, advocacy, brand advocates, brand advocacy, digital marketing, buzz marketing, product sampling, marketing research, marketing insights
    
Crowdtap
Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology, public, equinix, gigaom, pro, zynga, cdn, applications, software, network, limelight, iaas, paas, saas, data, center
    
Equinix
Published By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : 
look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
    
Turn
Published By: VMware, Inc     Published Date: Dec 05, 2013
IT as a service (ITaaS) provides a unique opportunity for IT and line-of-business leaders to realign to transform business. Over the past decade, IT organizations have worked hard to reduce delivery time and costs through automation and commoditization. At the same time, line-of-business owners have demanded more and unique offerings to drive agility and competitive advantage. More recently, the result has been business owners working outside of IT to meet their needs. Now, enabled by cloud computing, ITaaS is catalyzing profound change in IT organizations and the processes companies follow to achieve business goals. Please download the white paper to learn more.
Tags : 
itaas, delivery time, it automation, it commoditization, vmware, networking, it management, knowledge management, enterprise applications, data management, business technology
    
VMware, Inc
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
security
    
IBM
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Venafi     Published Date: Aug 07, 2015
Read this paper and discover how to reduce risk of SSH key misuse and develop a strategy to manage and secure SSH keys.
Tags : 
ssh, security, reduce risk, authentication, secure ssh keys, security application
    
Venafi
Published By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
    
FICO
Published By: Oracle     Published Date: Oct 29, 2015
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
Published By: Microsoft Office 365     Published Date: Jun 08, 2016
On this episode we help you navigate the areas of start-up funding, launching and crowdsourcing.
Tags : 
    
Microsoft Office 365
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
The talent landscape is more crowded than ever! Discover the keys to building a magnetic culture that attracts and retains top talent in tough markets. Read more.
Tags : 
    
Oracle HCM Cloud
Published By: BigCommerce     Published Date: Feb 13, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the box for important keys features, security, and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
bigcommerce, magento, ecommerce, shopify, shopping cart, website, dropshipping, amazon, ebay, google shopping, demandware, wesbite design, ecommerce website, best ecommerce, omnichannel, b2b ecommerce, erp, payment gateway, saas, sell online
    
BigCommerce
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com