Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

domain

Results 201 - 225 of 278Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jan 04, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations
    
Symantec
Published By: IBM     Published Date: Oct 30, 2014
Filled with exotic terms like “Hadoop” and “Data Scientist”, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses what’s really important when it comes to Big Data – and what businesses can do now to capitalize on the trend.
Tags : 
business analytics, big data, bi/ba, it management
    
IBM
Published By: Dyn     Published Date: Sep 25, 2013
Domain-based Message Authentication, Reporting & Conformance (DMARC) has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name. Read this whitepaper to learn the importance of DMARC and what it does for you.
Tags : 
dmarc, domain based message authentication, reporting comfirmation, authenticate sends, isp, internet service provider, dyn, network security
    
Dyn
Published By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : 
ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
    
Arbor Networks
Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email
    
EmailDirect
Published By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : 
veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields
    
Veeam
Published By: Riverbed     Published Date: Jul 15, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1
Tags : 
performance, management, software, networks, virtualizing servers, storage
    
Riverbed
Published By: HP     Published Date: Jun 03, 2014
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, enterprise applications
    
HP
Published By: Riverbed     Published Date: Sep 05, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1.
Tags : 
performance management, networking, software, virtualization, architecture, servers, enterprise applications
    
Riverbed
Published By: Lenovo     Published Date: Aug 22, 2018
This paper will explore ways HPC systems are being used in a wide range of business domains and disciplines to solve complex problems efficiently with related research and statistics.
Tags : 
hpc, compute workloads, blades, blade computing, racks, infrastructure, servers, power and cooling
    
Lenovo
Published By: Thawte     Published Date: Oct 06, 2015
Domain Validation (DV), Organisation Validation (OV) and Extended Validation (EV) SSL certificates offer completely different levels of authentication - but what does that mean? The right certificate for you depends on your business type and what you are using the certificate for. To discover which level of validation wins for your needs, download our quick reference guide now.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
Les certificats SSL de validation de domaine (DV), d’entité (OV) et étendue (EV) offrent des niveaux d’authentification complètement différents. Mais comment cela se traduit-il dans les faits En pratique, le certificat adapté à vos besoins dépendra de votre type d’activité et de l’utilisation que vous en ferez. Pour découvrir le niveau de validation qu'il vous faut, téléchargez vite notre guide de référence rapide.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
    
Thawte
Published By: GeoTrust     Published Date: Jan 21, 2016
Dans ce guide, vous serez confrontés à des situations courantes où ces certificats multidomaines s'affirment comme la solution idéale. Nous vous expliquerons aussi comment fonctionnent les certificats multi-domaines et comment sélectionner celui qui vous convient.
Tags : 
    
GeoTrust
Published By: GeoTrust     Published Date: Jan 21, 2016
In this guide, you’ll learn more about typical situations where multiple domain certificates are the ideal solution. We’ll also explain how multiple domain certificates work and how to select the right multi-domain certificate for your needs.
Tags : 
    
GeoTrust
Published By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, vmware, data protection, data domain, backup
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.