Secure Sockets Layer Reports

SSL Certificate Management: A Practical Guide
sponsored by Symantec Website Security
EGUIDE: This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Building Blocks of Transparent Web Security: Server-Gated Cryptography
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
Posted: 10 Sep 2007 | Published: 01 Sep 2005

VeriSign, Inc

8 reasons why Citrix NetScaler beats the competition
sponsored by Citrix
WHITE PAPER: Is your network ready for the Cloud? Not with other ADCs.  This free report explains how Citrix NetScaler beats the competition. Shift to Citrix NetScaler.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Open, Manage, and Accelerate SSL Encrypted Applications
sponsored by BlueCoat
WHITE PAPER: Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter.
Posted: 20 Sep 2007 | Published: 01 Sep 2007

BlueCoat

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE: SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Symantec Corporation

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign