ssl management

Results 76 - 92 of 92Sort Results By: Published Date | Title | Company Name
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail, network security, remote access, remote network management, wide area networks
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail, security, access control, internet security, network security appliance
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Infor     Published Date: Feb 27, 2007
In order to align their production plans with customer's demand, metal fabricators must integrate seamlessly into the customer's own processes. As a result, integrated systems are essential, bringing design, product lifecycle management and service together in ways that predict, act and rapidly change in accordance with the customer's needs.
Tags : 
productivity, customer experience management, supply chain management, scm, business process management, bpm, manufacturing, metal, infor
    
Infor
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec, ssl, central management, remote access, network security, next generation, authentication, security management
    
NCP Engineering GmbH
Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority, identity and authentication, authentication, identity management
    
VeriSign
Published By: Thawte     Published Date: Dec 29, 2015
This guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these certificates throughout their lifecycle.
Tags : 
    
Thawte
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
    
Entrust Datacard
Published By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
opentext, manufacturing, retailer, distributor
    
OpenText
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn How to take advantage of flexible consumption models to align hybrid cloud adoption with your business
Tags : 
    
AWS
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: DigiCert     Published Date: Jun 19, 2018
Are you spending too much time managing SSL/TLS certificates? Can you scan and report on your entire certificate estate? Have you seen a service go offline because of an expired certificate? Do you have to update certificates manually? If the answer to any of these questions is ‘yes’ then it’s time to invest in an automated certificate management tool. Download this whitepaper to find out more.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.