Standards  >   Security Standards  >  

Secure Socket Layer

RSS Feed    Add to Google    Add to My Yahoo!
Secure Socket LayerReports
 
Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Managing SSL Certificates with Ease
sponsored by Symantec Corporation
WHITE PAPER: Learn some of the most common pitfalls associated with SSL certificate management and how SSL certificate management tools can help keep information confidential and secure.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Corporation

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

AlertBoot Transitions to the Cloud at One-Third the cost with Riverbed Stingray Traffic Manager
sponsored by Riverbed Technology, Inc.
CASE STUDY: This case study reveals how a leading provider of full disk encryption switched to the cloud and needed a balancing soltution that could support the migration and prevent downtime.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Riverbed Technology, Inc.

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Securing your Online Data Transfer with SSL
sponsored by Thawte Inc.
WHITE PAPER: This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Thawte Inc.

SuperMassive E10000 Series Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement