The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
sponsored by TechTarget Search Windows Server
EZINE:
In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
Posted: 16 Apr 2009 | Published: 15 Apr 2009
|
|
|
Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER:
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008
|
|
|
Dell and Microsoft Windows Server 2008
sponsored by DellEMC and IntelĀ®
BROCHURE:
Windows Server 2008 is designed to provide increased reliability and control over your server infrastructure.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008
|
|
|
Keys to SAP Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER:
It is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
Posted: 19 Sep 2008 | Published: 18 Sep 2008
|
|
|
Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008
|
|
|
Clean VPN Approach to Secure Remote Access
sponsored by SonicWALL
WHITE PAPER:
In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
Posted: 25 Jun 2008 | Published: 01 Jun 2008
|
|
|
Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments
sponsored by Akamai Technologies
WHITE PAPER:
For today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally.
Posted: 07 Mar 2008 | Published: 01 Sep 2007
|
|
|
IPSEC VS. VPN: Transition Criteria and Methodology
sponsored by SonicWALL
WHITE PAPER:
This white paper explains the differences between the VPN technologies and provides criteria for deciding whether you should replace your IPSec VPN with SSL VPN. It also presents a step-by-step, practical approach to implementing your replacement.
Posted: 15 Nov 2007 | Published: 01 Nov 2007
|
|
|
How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER:
Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006
|
|
|
Open, Manage, and Accelerate SSL Encrypted Applications
sponsored by BlueCoat
WHITE PAPER:
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter.
Posted: 20 Sep 2007 | Published: 01 Sep 2007
|
|
|
Building Blocks of Transparent Web Security: Server-Gated Cryptography
sponsored by VeriSign, Inc
PRODUCT LITERATURE:
Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
Posted: 10 Sep 2007 | Published: 01 Sep 2005
|
|
|
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER:
The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006
|
|
|
How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER:
Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006
|
|