Sponsor: Thawte

Tech Spotlight: Thawte in Education

With the ever-changing advances in technology and the internet, it is imperative that you stay on top of the latest security measures at your institution to protect sensitive data. Download this comprehensive eBook highlighting recent security trends in education to learn more about what you need to do to protect your institution from potential threats.
Get Whitepaper

Top 10 Website Security Myths Revealed

When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Get Whitepaper

History of Cryptography

This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Get Whitepaper

10 Best Practices for Microsoft SharePoint Security

SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don't take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, there are 10 best practices that everyone should follow when using this collaboration tool.
Get Whitepaper

Securing Microsoft Exchange 2010

There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server.

This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Get Whitepaper

Choosing a Cloud Hosting Provider with Confidence

The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Get Whitepaper

History of Cryptography

This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Get Whitepaper

SharePoint Best Practices 2013

SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don't take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, there are 10 best practices that everyone should follow when using this collaboration tool.
Get Whitepaper