ssl tls

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: DigiCert     Published Date: Jun 19, 2018
1. Avoid Outages. 2. Save Time, Money, And Resources. 3. Manage Certificates at Scale. Download this infographic today to find out about the remaining benefits of using SSL/ TLS Automation in your business.
Tags : 
    
DigiCert
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Venafi     Published Date: Mar 26, 2015
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
Tags : 
data protection, cyberattacks, data privacy, ssl/tls, security, privacy
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management, enterprise applications
    
Venafi
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Thawte     Published Date: Jan 19, 2016
The Beginner’s Guide to Thawte SSL/TLS will rapidly demystify how SSL/TLS technology creates this trust, and explains why all SSL/TLS certificates and the Certificate Authorities issuing them are not created equal.
Tags : 
    
Thawte
Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking, security, data management, business technology
    
Symantec
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation
    
VeriSign, Inc.
Published By: DigiCert     Published Date: Jul 16, 2017
Best practices for SSL/TLS admins managing 100s or 1000s of certs
Tags : 
digicert, certificate management, public key infrastructure, ssl, network security, certificate lifestyle
    
DigiCert
Published By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : 
blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
    
Venafi
Published By: Blue Coat     Published Date: Nov 23, 2015
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances:
Tags : 
    
Blue Coat
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection
    
Entrust Datacard
Published By: Thawte     Published Date: Jan 19, 2016
In „Erste Schritte mit Thawte SSL/TLS“ erläutern wir in leicht verständlicher Form, wie SSL/TLS diese Vertrauenswürdigkeit herstellt und warum nicht alle SSL/TLS-Zertifikate und die ausstellenden Zertfizierungsstellen (Certificate Authority, CA) gleich sind.
Tags : 
    
Thawte
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Thawte     Published Date: Jan 19, 2016
Dans un climat de peur croissante face aux dangers de la cybercriminalité, la confiance des internautes est devenue un enjeu plus capital que jamais pour les cyberentreprises.
Tags : 
    
Thawte
Published By: Thawte     Published Date: Jan 19, 2016
La Guía para principiantes sobre los certificados SSL/TLS de Thawte aclara con rapidez cómo garantiza la seguridad esta tecnología y explica por qué no todos los certificados SSL/TLS ni todas las autoridades de certificación son iguales.
Tags : 
    
Thawte
Published By: DigiCert     Published Date: Jun 19, 2018
Are you spending too much time managing SSL/TLS certificates? Can you scan and report on your entire certificate estate? Have you seen a service go offline because of an expired certificate? Do you have to update certificates manually? If the answer to any of these questions is ‘yes’ then it’s time to invest in an automated certificate management tool. Download this whitepaper to find out more.
Tags : 
    
DigiCert
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Venafi
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https, tls/ssl, vulnerability management, sensitive information, hackers
    
VeriSign, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi, wi-fi, tls, protect
    
VeriSign Authentication Services, now a part of Symantec Corp.
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee