secure online

Results 26 - 50 of 62Sort Results By: Published Date | Title | Company Name
Published By: Soonr     Published Date: Sep 03, 2014
Download to learn how Calamar Construction used the Soonr Workplace secure online fire sharing solution to solve several workplace challenges.
Tags : 
soonr, construction, online file sharing, secure file sharing, file sharing solution, workplace challenges, project management
    
Soonr
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication, encryption, sgc, http
    
VeriSign, Inc.
Published By: C.B.Learning     Published Date: Jul 10, 2008
An official provider of Microsoft Online Learning, C.B.Learning offers cost-effective, managed training which your team can complete without leaving the office. Their Learning Management System (LMS) is a secure online service that offers you a direct way to monitor progress and helps you extend your training budget. Try a free Microsoft course today.
Tags : 
network management, microsoft, mcp, certification, microsoft certification, training, online training, online classes, online certification, c. b. learning, c.b.learning, learning
    
C.B.Learning
Published By: thawte     Published Date: Nov 06, 2006
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl, encryption, security, application security, online data transfer, data security, secure socket layer, ssl certificate, security certificate, internet security, web services security, web security, thawte, digital certificate
    
thawte
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : 
shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication, webtrust auditors, internet explorer 7, ie7, green address bar, security status bar, verisign secured seal, phishing, ev upgrader, verisign, verisign, verisign, ssl
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how certifying a web site to the McAfee Data Security Standard improved online conversions for Littman Brothers. Download today!
Tags : 
littman brothers, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ROUSH improves online marketing and builds trust and rapport by increasing trust and security of their online site. Learn more today!
Tags : 
roush, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : 
container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Foreclosures.com differentiates itself from competition by displaying the McAfee SECURE™  trustmark. Learn more today!
Tags : 
foreclosure, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: Symantec     Published Date: Jan 10, 2013
Company or not, it is important that you approach your security meticulously. This Symantec guide will de-mistify the technology and give you the information you need to make the best decision when considering your online security options.
Tags : 
secure socket layers, security, symantec, online security
    
Symantec
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm
    
Rapid7
Published By: DocuSign     Published Date: Aug 17, 2016
With DocuSign there is no more mailing or overnighting application packages. Instead, applicants receive an email with a link to a secure DocuSign site where they can read, review, and sign application documents and agreements online –or from their mobile device.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs, human resources
    
DocuSign
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to secure your customers online by offering strong security that is easy to use and cost-effective.
Tags : 
online consumers, security, availability, data protection, cost-effective secuirty
    
Symantec
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl
    
Symantec
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities
    
GeoTrust
Published By: Thawte     Published Date: Oct 06, 2014
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl certificates, application, web server, sensitive information, customer confidence
    
Thawte
Published By: Thawte     Published Date: Aug 08, 2013
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology
    
Thawte
Published By: IBM     Published Date: May 30, 2008
View to this webcast and learn how Memorial Health System, a 500-bed hospital system in Colorado Springs, Colorado, has recently implemented a portal strategy based on IBM WebSphere Portal and Lotus Web Content Management that allows them to quickly and securely provide online capabilities for their external and internal user constituencies.
Tags : 
hospital, portal, corporate portal, collaboration, ibm, websphere, ibm ep, ep campaign
    
IBM
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : 
cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Start   Previous    1 2 3    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.