Home
 > Research and Reports > White Papers > Managing SSL Security

Managing SSL Security

Source: Entrust
Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As organizations increasingly rely on SSL, the number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity.


Featured publications:

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
Source: Dynamic Network Services DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Read this white paper to find out all of the scary details about these attacks and what you can do to prevent them. Read More...
IQMS Continues to Extend EnterpriseIQ ERP Footprint
Written By: Ted Rohm Published On: April 16 2014 IQMS recently announced the release of a number of new large modules and some 550 functional enhancements to its flagship solution EnterpriseIQ. The most recent module added to EnterpriseIQ is the WebDirect B2C portal. The WebDirect B2C storefront lets consumers browse products, make product purchases, and monitor order status and history directly on a manufacturer’s Web site. Read More...
Embedded Devices & Data Thieves
Source: Netop In an era known as “the Internet of Everything,” embedded devices are on the rise—still embedded security remains a weak link. For many companies, basic security deficiencies are the norm, a fact borne out by the number of hacks in the headlines. This paper explores the methods that data thieves rely on to crack embedded devices, then presents a model for a multi-layer security strategy, honing in on embedded remote access for an in-depth example. Read More...


You may also be interested in these related documents:

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Source: Symantec Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions from established vendors, like VeriSign, that deliver protection and consumer peace-of-mind through the use of cutting edge technology to meet emerging threats. Read More...
Open, Manage, and Accelerate SSL Encrypted Applications
Source: Blue Coat Systems Although secure sockets layer (SSL) is a ubiquitous enabler of e-commerce and outsourcing, it creates a special challenge for network administrators and security professionals because its encryption is known to decelerate data. In order to regain control over application delivery—when everything business-related is encrypted—organizations need to look toward SSL-aware solutions that can help decipher and accelerate data. Read More...
Securing XML Web Services: SSL, XML Firewalling, and Beyond
Source: Layer 7 Technologies There’s no universal solution for Web services security. Sometimes, access lists programmed into the Web services themselves are sufficient. Other times, Secure Sockets Layer (SSL) may be more than adequate. However, when granular message processing and auditing is essential, dedicated extensible markup language (XML) and Web services security technology will prove necessary. Which options are right for you? Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.