Secure Sockets Layer Reports

The Problem with the Padlock
sponsored by TechTarget Security
EBOOK: TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

TechTarget Security

Open, Manage, and Accelerate SSL Encrypted Applications
sponsored by BlueCoat
WHITE PAPER: Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter.
Posted: 20 Sep 2007 | Published: 01 Sep 2007

BlueCoat

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

Application Delivery Controllers and the A10 Advantage
sponsored by A10 Networks
WHITE PAPER: In this resource, discover an application delivery controller (AD) solution that accelerates, optimizes, secures, and scales application traffic in both physical and virtual servers to meet today's demands.
Posted: 26 Dec 2013 | Published: 30 Jun 2013

A10 Networks

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

The Evolving Threat Landscape
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

How SSL and TLS Secure Network Transactions
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Symantec & Blue Coat Systems

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Dell and Microsoft Windows Server 2008
sponsored by DellEMC and Intel®
BROCHURE: Windows Server 2008 is designed to provide increased reliability and control over your server infrastructure.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

DellEMC and Intel®

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online
sponsored by VeriSign EMEA
WHITE PAPER: If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA