Website Security Threat Report Part 1

Stay up-to-date with Symantec's WSTR 2015: Your 3-Part report to the world's current and emerging website security threats. Packed with valuable insights and statistics, it's all you need to know about the threats that impact your online business world.
Get Whitepaper

The Top 10 TLS/SSL Client, Server, and Application Best Practices

Ensure that you are using TLS/SSL certificates in the most secure manner. Read this whitepaper for an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.

This whitepaper covers how to ensure that:
• Security software and settings on your web server are up-to-date.
• Your Internet browser and client are up-to-date.
• Your client computers are free of malware.
• You keep an eye on the expiry date of your TLS/SSL certificates and replace them quickly.
Get Whitepaper

Hidden Dangers Lurking in E-Commerce: Reducing Fraud with the Right SSL Certificate

E-commerce has grown at exponential rates in the past decade, with consumers quickly recognizing the convenience of purchasing goods online. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates.

SSL certificates verify that the provider is who they claim to be and also indicate secure connections between personal devices and company websites. There are three types of SSL certificates, each requiring a different level of authentication: DV, OV and EV.

Understanding the differences among each SSL certificate type is important to help prevent falling victim to scammers. For example, DV certificates are quick and easy to procure and don't require any type of information indicating the person trying to get the DV certificate actually represents a legitimate business. Fraudsters often use DV certificates to lure consumers to phishing websites that look authentic but are designed to steal sensitive information. For this reason, doing any type of ecommerce transaction on a DV-only site poses risk.

Online shopping isn't going away. Until the industry requires an OV or EV certificate for e-commerce sites or an easier way to identify the types of certificates, consumers will have to bear some of the burden of combating cyber risks. Knowing the risks ahead of time, however, is half the battle.
Get Whitepaper

Six Golden Rules for Selecting an SSL or TLS Certificate

The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection.

Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly.

When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules.

At the end of the day, people want to make sure their Web sites are secured with as little friction as possible - Symantec gives businesses every opportunity to achieve that goal.
Get Whitepaper

Raise Your Google Ranking

To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites.

Learn more about this and other ways to boost your ranking in this white paper.
Get Whitepaper

Website Security For Dummies

This 'Website Security for Dummies' Guide offers an insight and an unique understanding of the threats that impact the online business and helps answer the below questions and more:
  • How does SSL work?
  • What makes EV SSL worth it?
  • Why use the Always On SSL approach?
  • What are the most common threats?
Get Whitepaper

Flash or SSD: Why and When to Use IBM FlashSystem

This IBM® Redpaper™ publication explains how to select an IBM FlashSystem™ or solid-state drive (SSD) solution. It describes why and when to use FlashSystem products, and reviews total cost of ownership (TCO), economics, performance, scalability, power, and cooling. Read this guide for information about selecting the correct solution (SSD or flash technology).

View IBM's privacy policy here

Get Whitepaper

Ultimate Guide to Assessing and Comparing Two-Factor Authentication Solutions

Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide. In this guide, you will learn:
  • How to evaluate the security, reliability, and scalability of a two-factor solution
  • What kind of solution allows you to detect and react to potential threats
  • How to determine the time and costs involved in rolling out a two-factor solution
  • Key criteria to drive user adoption and increase productivity
Get Whitepaper

Two-Factor Authentication Evaluation Guide

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

Two-factor authentication — there are so many different solutions, authentication methods, integration issues, and new security concerns cropping up in the market. With such a large diversity of vendors, it's easy for IT security decision-makers to get confused about which solution is right for their organization.

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

In this guide, you will learn:
  • How to evaluate the security, reliability and scalability of a two-factor solution.
  • What kind of solution allows you to detect and react to potential threats.
  • How to determine the time and costs involved in rolling out a two-factor solution.
  • Key criteria to drive user adoption and increase productivity.
Get Whitepaper