Sponsor: Symantec Corporation

How Trustworthy Is Your Certificate Authority?

The choices available for picking out a certificate authority to issue SSL certificates can seem dizzying for the typical web operations team. With so many different CAs operating with essentially the exact same underlying cryptographic technology, it might well seem like these certs are a commodity item best purchased based on price point alone. And now that there are organizations offering free certificates as well, the big question is whether cheap—or free—is really worth it.
Get Whitepaper

Top 5 SSL Attack Vectors

It’s often claimed that SSL/TLS vulnerabilities represent the web’s weakest security link. This TechTarget paper examines the highest profile attack vectors, the exposures they cause, and the resulting fallout associated with each. Download now and discover why:
  • SSL/TLS certificates need to be at least 2048-bit RSA or 256-bit ECC
  • The only secure, standard hash algorithm is SHA-2
  • Root certificates must be heavily defended by the CA
  • The security of systems storing and using private SSL/TLS keys must also be tightly guarded
Get Whitepaper

Protection from Advanced Threats with Symantec Insight/SONAR

With targeted attacks and unknown threats continuing to grow, it’s easy to feel overwhelmed and unsure about whether you’ve taken the right steps to protect your business. Connecting to the Internet and sharing information both inside and outside of your company network is imperative to nearly every business today, but how can you be confident that you’re protecting vital business assets and customer information from advanced threats?

Learn more from this Symantec Solution Brief.
Get Whitepaper

Code Signing, an Essential Security Feature to Add to Your Software – Infographic

Code signing certificates are digital certificates that will help protect users from downloading compromised files or applications. When a file or application signed by a developer is modified or compromised after publication, a popup browser warning will appear to let users know that the origin of the file or application cannot be verified.

Symantec Code Signing helps securely deliver apps and code to more customers, on more platforms than any other provider.

Symantec root certificate ubiquity is second to none. The root certificates come preinstalled on most devices and are embedded in most applications, helping minimize security warnings while maximizing distribution and revenue. Symantec is the only authorized code signing provider for Windows Phone, AT&T Developer Program, Java Verified, and Symbian Signed applications.
Get Whitepaper

Code Signing, an Essential Security Feature to Add to Your Software

Code signing certificates are digital certificates that will help protect users from downloading compromised files or applications. When a file or application signed by a developer is modified or compromised after publication, a popup browser warning will appear to let users know that the origin of the file or application cannot be verified.

Symantec Code Signing helps securely deliver apps and code to more customers, on more platforms than any other provider.

Symantec root certificate ubiquity is second to none. The root certificates come preinstalled on most devices and are embedded in most applications, helping minimize security warnings while maximizing distribution and revenue. Symantec is the only authorized code signing provider for Windows Phone, AT&T Developer Program, Java Verified, and Symbian Signed applications.
Get Whitepaper

Quick Reference Guide to Always-On SSL

Always-On SSL is a cost-effective security measure for websites that helps protect the entire user experience from online threats. It delivers authentication of the identity of the website and encrypts all information shared between the website and a user (including any cookies exchanged), protecting the data from unauthorized viewing, tampering, or use.
Get Whitepaper

5 Reasons Cloud Increases the Importance of Identity and Strong Authentication

As cloud computing has permeated the enterprise, the entire complexion of IT services and user interaction with technology has been transformed. The business benefits of cloud are obvious, but many organizations are still trying to find ways to cope with the security implications of increased cloud usage.

While there are a number of security considerations to take into account, perhaps none is more important than identity and strong authentication. As cloud muddles an already crumbling moat-and-castle perimeter security model, identity becomes the front line of defense for securing cloud applications and infrastructure, along with the data residing in them. Here are five reasons why identity is so crucial in this still-evolving cloud era.
Get Whitepaper

Top 5 Reasons to Choose User-Friendly Strong Authentication

This executive brief asserts that easy and secure authentication is possible, and offers five reasons an organization should adopt such a solution. Insights are provided into how to choose the right two-factor authentication (2FA) solution, including integration with complimentary solutions like single sign-on, to ensure you are prepared for the challenges of today and tomorrow.
Get Whitepaper

Website Security Threat Report Part 3

We hope you enjoyed parts 1 and 2 of the Symantec WSTR 2015. Now download part 3 to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams.

Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Get Whitepaper

Website Security Threat Report Part 2

We hope you enjoyed part 1 of the Symantec WSTR 2015. Now download part 2 for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Get Whitepaper

Website Security Threat Report Part 1

Stay up-to-date with Symantec's WSTR 2015: Your 3-Part report to the world's current and emerging website security threats. Packed with valuable insights and statistics, it's all you need to know about the threats that impact your online business world.
Get Whitepaper

The Top 10 TLS/SSL Client, Server, and Application Best Practices

Ensure that you are using TLS/SSL certificates in the most secure manner. Read this whitepaper for an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.

This whitepaper covers how to ensure that:
• Security software and settings on your web server are up-to-date.
• Your Internet browser and client are up-to-date.
• Your client computers are free of malware.
• You keep an eye on the expiry date of your TLS/SSL certificates and replace them quickly.
Get Whitepaper

Hidden Dangers Lurking in E-Commerce: Reducing Fraud with the Right SSL Certificate

E-commerce has grown at exponential rates in the past decade, with consumers quickly recognizing the convenience of purchasing goods online. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates.

SSL certificates verify that the provider is who they claim to be and also indicate secure connections between personal devices and company websites. There are three types of SSL certificates, each requiring a different level of authentication: DV, OV and EV.

Understanding the differences among each SSL certificate type is important to help prevent falling victim to scammers. For example, DV certificates are quick and easy to procure and don't require any type of information indicating the person trying to get the DV certificate actually represents a legitimate business. Fraudsters often use DV certificates to lure consumers to phishing websites that look authentic but are designed to steal sensitive information. For this reason, doing any type of ecommerce transaction on a DV-only site poses risk.

Online shopping isn't going away. Until the industry requires an OV or EV certificate for e-commerce sites or an easier way to identify the types of certificates, consumers will have to bear some of the burden of combating cyber risks. Knowing the risks ahead of time, however, is half the battle.
Get Whitepaper

Six Golden Rules for Selecting an SSL or TLS Certificate

The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection.

Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly.

When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules.

At the end of the day, people want to make sure their Web sites are secured with as little friction as possible - Symantec gives businesses every opportunity to achieve that goal.
Get Whitepaper

Raise Your Google Ranking

To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites.

Learn more about this and other ways to boost your ranking in this white paper.
Get Whitepaper