RSS feed Get our RSS feed

News by Topic

browser

Results 1 - 25 of 98Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : cyber security, security, web linking, performance
     Akamai Technologies
By: Entrust Datacard     Published Date: Jun 14, 2017
This paper discusses how browsers support EV certificates and display trusted websites.
Tags : 
     Entrust Datacard
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
WebRTC, web real-time communications, is one of the hottest topics in the video communications industry, and for good reason. In a nutshell, WebRTC enables a user to connect over video without having to download a software client or plugin, and no username or password is required. Basically, all you need is a webcam, an Internet connection and the right browser (for example, the latest versions of Mozilla® or Chrome™), and you can connect over video with colleagues, partners, vendors and customers.
Tags : web browser, video conferencing, communication, web apps
     LifeSize, a division of Logitech
By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines
     Entrust Datacard
By: SAP     Published Date: May 20, 2015
Best practices and resources for companies researching, justifying, developing, launching, and maintaining successful B2B e-commerce operations
Tags : b2b, ecommerce playbook, operations, consumers, mobile browsers
     SAP
By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
     Ping Identity
By: Citrix Systems     Published Date: Sep 17, 2015
Learn how Citrix XenApp allows a single image of a browser to be hosted centrally and delivered on-demand, providing a simple and secure way to manage browsers and apps.
Tags : citrix, xenapp, apps, browsers, it solutions
     Citrix Systems
By: SiteSpect     Published Date: Apr 14, 2015
See How Leading Online Brands are Converting Browsers into Buyers With the online retail sector growing quickly, so is the competition for that increased revenue and growth. Now more than ever, online retailers recognize that it's not only vital to drive shoppers to their sites, but also to ensure that they stay and make online purchases in growing numbers. The key to increased conversions is optimizing the online customer experience — and what was once an art, is now just as much a science.
Tags : website optimization, website optimisation, site optimization, site optimisation, site optimization ecommerce, optimize ecommerce site, optimize ecommerce website, ecommerce site optimization
     SiteSpect
By: MessageLabs     Published Date: Sep 25, 2008
In order to better understand where spyware is going, or more importantly, where it’s evolved from, we actually need to wind the clock back a lot further than may be first imagined; in fact, over fifteen years. If we look at the embryonic stages of the anti-virus industry, around sixteen years ago there were the first boot-sector viruses. It has taken this time for viruses as we’ve traditionally known them to evolve towards the more commercially viable, or intellectual-property-theft status that we now associate with contemporary viruses, a fact not realized by many. This whitepaper goes in-depth to discuss the history of spyware and its evolving future.
Tags : messagelabs, spyware, viruses, botnets, microsof, browser helper object, web threats, malware
     MessageLabs
By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps
     Okta
By: Cloudroute     Published Date: Jun 01, 2016
Most companies are have decided they need the business agility and the cost savings that come when moving to the cloud with nearly 90 percent of businesses having adopted the cloud in some capacity. But with the bewildering amount of contradictory opinions and information floating around on the Internet, not many understand exactly what that means or what it entails. Companies considering Microsoft Office 365 as their first step in moving applications to hosted solutions face similar inconsistencies, making it difficult to separate fact from fiction. For example, some businesses incorrectly believe Office 365 is simply a version of Office accessed by a browser. Astonishing right!
Tags : 
     Cloudroute
By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : entrust, non fqdns, certificates, forum changes, publicly trusted certificates
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : non-fqdns, depreciation, internal server names, reserved ip addresses
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : entrust, sha-2, chrome, security, certificate, b2b, application, browser
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas
     Entrust Datacard
By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking
     F5 Networks Inc
By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
     Citrix Systems
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics