Standards  >   Security Standards  >  

Secure Socket Layer

RSS Feed    Add to Google    Add to My Yahoo!
Secure Socket Layer Reports
 
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

The F5 Acceleration Portfolio
sponsored by F5 Networks
WHITE PAPER: F5 is the leader in Application Delivery Networking, ensuring applications are secure, fast, and available. This white paper provides an overview of specific F5 acceleration features across three F5 product lines.
Posted: 07 Oct 2008 | Published: 07 Oct 2008

F5 Networks

Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER: Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Citrix

AlertBoot Transitions to the Cloud at One-Third the cost with Riverbed Stingray Traffic Manager
sponsored by Riverbed Technology, Inc.
CASE STUDY: This case study reveals how a leading provider of full disk encryption switched to the cloud and needed a balancing soltution that could support the migration and prevent downtime.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Riverbed Technology, Inc.

Keys to SAP Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: It is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online
sponsored by VeriSign EMEA
WHITE PAPER: If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

The ROI of Application Delivery Controllers in Traditional and Virtualized Environments
sponsored by F5 Networks
WHITE PAPER: How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement