Website Security For Dummies

This 'Website Security for Dummies' Guide offers an insight and an unique understanding of the threats that impact the online business and helps answer the below questions and more:
  • How does SSL work?
  • What makes EV SSL worth it?
  • Why use the Always On SSL approach?
  • What are the most common threats?
Get Whitepaper

Ultimate Guide to Assessing and Comparing Two-Factor Authentication Solutions

Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide. In this guide, you will learn:
  • How to evaluate the security, reliability, and scalability of a two-factor solution
  • What kind of solution allows you to detect and react to potential threats
  • How to determine the time and costs involved in rolling out a two-factor solution
  • Key criteria to drive user adoption and increase productivity
Get Whitepaper

Two-Factor Authentication Evaluation Guide

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

Two-factor authentication — there are so many different solutions, authentication methods, integration issues, and new security concerns cropping up in the market. With such a large diversity of vendors, it's easy for IT security decision-makers to get confused about which solution is right for their organization.

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

In this guide, you will learn:
  • How to evaluate the security, reliability and scalability of a two-factor solution.
  • What kind of solution allows you to detect and react to potential threats.
  • How to determine the time and costs involved in rolling out a two-factor solution.
  • Key criteria to drive user adoption and increase productivity.
Get Whitepaper

Best Practice Security in a Cloud Enabled World

This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Get Whitepaper

Securing Multiple Domains with SSL

As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate.

Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Get Whitepaper

Creating an E-commerce Web Site: A Do-It-Yourself Guide

In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.
Get Whitepaper

Geek Guide: Apache Web Servers and SSL Authentication

Congratulations! You’ve decided to set up a Web site. The site might be for your personal use, for sharing family pictures, for a blog, for an SaaS application, or any number of other possibilities. In all of those cases, people will access your site using the Hypertext Transfer Protocol (HTTP). HTTP has evolved and improved through the years, but one thing about it hasn’t changed—the fact that all of the traffic sent on an HTTP connection is unencrypted.

The bottom line is that whether you want or need to do so, adding HTTPS to a site you’re running isn’t very hard to do. In this Geek Guide, I walk through what SSL/TLS is (and isn’t), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Get Whitepaper

Google Ranking Report

To promote safer websites and help create a more secure web, Google now gives sites secured with Always On SSL an SEO (Search Engine Ranking) boost. Learn about this and other ways to rank higher with GeoTrust.
Get Whitepaper

E-commerce 101: A Guide to Successful Selling on the Web

For many business owners, launching an online shopping site makes perfect sense. However, there are some important things you should know before diving into the e-commerce marketplace. The online economy is ripe with opportunity, but it's also rife with pitfalls that can trip up even the savviest business person. This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Get Whitepaper

SSL 101: A Guide to Fundamental Website Security

As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety.

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Get Whitepaper

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL.

In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Get Whitepaper

Wild Card and SAN

Multi-Use SSL Certificates such as Wildcard and SAN certificates are becoming an increasingly common requirement in securing today's IT infrastructure. Find out about how these certificates can provide greater flexibility to simplify certificate management and reduce costs.
Get Whitepaper

Phishing Tactics

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years. You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cyber crime ecosystem and the impact on a business can be quite severe.

Organizations need to stay current on the latest methods employed by cyber criminals, and proactively take steps to protect themselves from fraud. This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Get Whitepaper

SSL for Apps Best Practices for Developers

SSL is a fundamentally sound technology that provides confidentiality, authentication, and integrity. The most significant challenge facing the SSL ecosystem is not a technological flaw or limitation, but rather the way it is being implemented and the practices around it.

This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL Client non-browser applications should follow all the practices in this document to ensure the high level of authentication, confidentiality and integrity promised by SSL are achieved.
Get Whitepaper