RecruitingBlogscom

Follow Us:

 

security technology

Results 351 - 375 of 435Sort Results By: Published Date | Title | Company Name
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains, retail
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : 
security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions, security
    
GeoTrust
Published By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : 
business computing, information technology, symantec, verisign, web security, security, business technology
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : 
information security, information technology, web applications, security, business technology
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to confidently choose a cloud hosting provider and see how your organization can take advantage of the economic benefits, but also avoid potential security risks.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to build confidence and profit online using internet trust marks, which will strengthen consumer confidence, drive sales, boost margins, and enhance a website’s competiveness.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to reduce the cost and complexity of your web vulnerability management in order to protect your organization, website, and customers.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how security and trust are the backbone to doing business over the internet and see how your organization could be losing business because it is not taking the proper measures to protect data.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to leverage multi-use digital certificates to simplify certificate management and reduce your organization’s costs.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to properly manage your certificates and receive the 7 steps for migrating from your 1024-bit RSA to stronger SSL certified key lengths.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : 
spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
    
Aladdin
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom
    
Pointsec
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top