Creating an E-commerce Web Site: A Do-It-Yourself Guide

In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.
Get Whitepaper

Geek Guide: Apache Web Servers and SSL Authentication

Congratulations! You’ve decided to set up a Web site. The site might be for your personal use, for sharing family pictures, for a blog, for an SaaS application, or any number of other possibilities. In all of those cases, people will access your site using the Hypertext Transfer Protocol (HTTP). HTTP has evolved and improved through the years, but one thing about it hasn’t changed—the fact that all of the traffic sent on an HTTP connection is unencrypted.

The bottom line is that whether you want or need to do so, adding HTTPS to a site you’re running isn’t very hard to do. In this Geek Guide, I walk through what SSL/TLS is (and isn’t), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Get Whitepaper

Google Ranking Report

To promote safer websites and help create a more secure web, Google now gives sites secured with Always On SSL an SEO (Search Engine Ranking) boost. Learn about this and other ways to rank higher with GeoTrust.
Get Whitepaper

E-commerce 101: A Guide to Successful Selling on the Web

For many business owners, launching an online shopping site makes perfect sense. However, there are some important things you should know before diving into the e-commerce marketplace. The online economy is ripe with opportunity, but it's also rife with pitfalls that can trip up even the savviest business person. This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Get Whitepaper

SSL 101: A Guide to Fundamental Website Security

As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety.

Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Get Whitepaper

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL.

In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Get Whitepaper

Wild Card and SAN

Multi-Use SSL Certificates such as Wildcard and SAN certificates are becoming an increasingly common requirement in securing today's IT infrastructure. Find out about how these certificates can provide greater flexibility to simplify certificate management and reduce costs.
Get Whitepaper

Phishing Tactics

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years. You no longer need to be a sophisticated hacker to commit fraud on the Internet. Anyone who is motivated can join in, thanks to the off-the-shelf phishing kits provided by a thriving cyber crime ecosystem and the impact on a business can be quite severe.

Organizations need to stay current on the latest methods employed by cyber criminals, and proactively take steps to protect themselves from fraud. This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Get Whitepaper

SSL for Apps Best Practices for Developers

SSL is a fundamentally sound technology that provides confidentiality, authentication, and integrity. The most significant challenge facing the SSL ecosystem is not a technological flaw or limitation, but rather the way it is being implemented and the practices around it.

This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL Client non-browser applications should follow all the practices in this document to ensure the high level of authentication, confidentiality and integrity promised by SSL are achieved.
Get Whitepaper

Simplify SSL Certificate Management Across the Enterprise

The need for SSL Certificates has moved well beyond the “buy” page to core functions of the enterprise. SSL Certificates are used to protect remote employee and partner communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL Certificates when used to display customer account information, business partner transactions and for employee productivity tools. Finally, SSL Certificates are used to secure server-to-server communications for applications and data exchange.

Managing individual Certificates across a large organization quickly becomes complicated with multiple locations, many divisions, and rapidly growing Web-based services. If an SSL Certificate expires, a company not only loses sales and puts customer confidence in jeopardy, employees and business partners may not be able to do their work or risk exposure of confidential information. Managing SSL Certificates across complex networks to ensure protection and prevent unanticipated expirations has become mission critical to all businesses.

This guide provides five simple steps for IT professionals to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates throughout their lifecycle.
Get Whitepaper

Best Practices and Applications of TLS/SSL

TLS (Transport Layer Security), widely known as SSL (Secure Sockets Layer), is the most well known method to secure your web site. But it can also be used for much more. Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Get Whitepaper

Beginner’s Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options

Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company.
Get Whitepaper

Best Practices and Applications of TLS/SSL

SSL/TLS has been and will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors and shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers.

This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Get Whitepaper

Evaluator Group: Investing Strategically in All Flash Arrays

The transition of dependence on rotating disk to integrating solid state storage within the enterprise data center has wide ranging implications for enterprise IT. As this transition occurs and the cost per unit of solid state storage capacity inevitably decreases, enterprise IT will realize that solid state storage technology benefits many aspects of enterprise IT. The true value of flash storage is not determined on a cost per TB calculations alone.
Get Whitepaper

Driving Business Value from Flash-optimized Storage

Solid- state flash storage is one of today's most important "old yet new" IT technologies. It's old in the sense that some form of solid-state memory has been around since the 1970s. Flash technology arose in the 1980s, and modern flash drives within enterprise storage subsystems arrived on the market back in 2008, with various types of flash-card packaging being the latest turn of the technology crank.

Flash storage is new because the ongoing advances in performance, density, and other factors are still continuing to help flash take over an increasing number of performance-sensitive workloads from conventional spinning-desk arrays.

Get Whitepaper