Secure Socket Layer Reports

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

The Problem with the Padlock
sponsored by TechTarget Security
EBOOK: TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

TechTarget Security

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
Posted: 30 Sep 2013 | Published: 31 Dec 2011

GeoTrust, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by TechTarget Security
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TechTarget Security

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes.
Posted: 04 Feb 2013 | Published: 04 Feb 2013

Thawte Inc.

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: To maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Citrix

Managing SSL Certificates with Ease
sponsored by Symantec Website Security
WHITE PAPER: Learn some of the most common pitfalls associated with SSL certificate management and how SSL certificate management tools can help keep information confidential and secure.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.