RSS feed Get our RSS feed

News by Topic

securing

Results 376 - 400 of 465Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Oct 02, 2012
Securing Multiple Web Server and Domain Configurations
Tags : symantec, web server, domain configurations, commerce
     Symantec
By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
     Symantec
By: Symantec     Published Date: Apr 04, 2013
How Code Signing Can Bolster Security for Mobile Applications
Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
     Symantec
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
     Symantec
By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.
Tags : pki, pki ecosystem, browser developers, internet security, security, symantec
     Symantec
By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
     Symantec
By: Symantec     Published Date: Jun 18, 2015
Learn how to secure your customers online by offering strong security that is easy to use and cost-effective.
Tags : online consumers, security, availability, data protection, cost-effective secuirty
     Symantec
By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : mobile devices, enterprise in the cloud, data breach, centralized servcers, security
     Symantec
By: Symantec     Published Date: Nov 30, 2015
As one of the world’s leading certificate authorities, we at Symantec take the responsibility for securing the transit of data on the Internet as a serious obligation to our customers.
Tags : 
     Symantec
By: Symantec     Published Date: Nov 19, 2014
The top ten tips on how to secure your business against cyber risk and threats.
Tags : tips for cyber resilience
     Symantec
By: Symantec     Published Date: Jul 31, 2017
The Shadow Data Report, published by Symantec, addresses key trends and challenges faced by enterprises securing data in cloud apps and services.
Tags : data, data security, cloud, threat and vulnerability management, cloud applications
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : secure web gateway, web application, cloud application, encryption, web threats
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : cloud, cloud service providers, cloud security, cloud applications
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : symantec, stuxnet, cyber-attack, security, certificate authority
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : symantec, mobile, mobile applications, security
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : security, mobile, mobile app, code, mobile application, code signing
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : security, code signing, software, private keys
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : security, software, mobile, mobile application, malware, code signing
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 09, 2014
Hackers are taking aim at your small business website. Defend yourself—and your customers—with strong, affordable online security.
Tags : hackers, online security, cyberattacks, affordable, security
     Symantec Corporation
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to discover the four key things you should know about securing small to medium enterprises in the current business landscape.
Tags : smb, data security, database security, backup and recovery, data loss, malware, security
     Symantec.cloud
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics