All Research Sponsored By:Thawte Inc.

The Tangled Web of Data Privacy Issues
EGUIDE: In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013


Mobile, Social Engineering Top Data Security Management Concerns
EGUIDE: This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns.
Posted: 15 Nov 2013 | Published: 15 Nov 2013


Why Switch to Thawte?
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013


How to Comply with the HIPAA Security Rule
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013


Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
EGUIDE: This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all.
Posted: 16 Jul 2013 | Published: 16 Jul 2013


How to Secure Your Microsoft SharePoint Products
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013


SharePoint Security Should Not Be an Afterthought
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013


Securing SharePoint: SharePoint Security Best Practices
EGUIDE: This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.
Posted: 16 May 2013 | Published: 16 May 2013


SSL Certificate Management: Common Mistakes and How to Avoid Them
EGUIDE: This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
Posted: 12 Feb 2013 | Published: 12 Feb 2013


SSL Certificate Management: Common Mistakes and How to Avoid Them
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013


Virtual Data Center E-Zine:Volume 32: Public vs. Private: Comparing Cloud Architectures
EZINE: In this e-zine, compare the trade-offs of private and public cloud computing. Find out how you can measure, monitor and optimize the performance of applications in the cloud. Plus, learn how you can develop a solid plan for virtualizing your applications.
Posted: 01 Feb 2012 | Published: 01 Feb 2012


Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration
EGUIDE: Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.
Posted: 19 May 2011 | Published: 19 May 2011


E-guide: Web SSL VPNs vs. traditional IPsec VPNs: How do they measure up?
EGUIDE: This e-guide from SearchEnterpriseWAN.com, uncovers the key advantages of Web SSL VPNs and explores the top benefits, how they differ from traditional IPsec VPNs and why now is the right time to invest.
Posted: 18 May 2011 | Published: 18 May 2011


Beating Web Application Security Threats
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010