Tek-Tips | Security RSS feed for this section
Is the Cloud Safe Enough for Your Business Communications?

Is the Cloud Safe Enough for Your Business Communications?

Security Concerns of VoIP CXOs have many valid concerns regarding hosted phone and communications platform: learn about the main security considerations that professionals need to consider when evaluating the risks of cloud phone systems, and how to deal with them. This paper covers concerns such as: Security, encryption and access management Ability to control, manage […]

Read full story Comments { 0 } Download Whitepaper
Business Phones Security

Business Phones Security

Threats to VoIP and What to Do about Them In the Internet age, businesses have learned about the importance of digital security. Sometimes, we forget that our phone systems are now internet-based and are therefore subject to many of the same security threats that we hear about on a daily basis – malware and viruses […]

Read full story Comments { 0 } Download Whitepaper
Certify your Software Integrity with Thawte Code Signing Certificates

Certify your Software Integrity with Thawte Code Signing Certificates

As a software developer you know that the product you make available on the Internet can be tampered with (without detection) if it is not secured. You want customers to know that the software really comes from the publisher who signed it and that it has not been altered or corrupted. That is why you […]

Read full story Comments { 0 } Download Whitepaper
Server-Gated Cryptography: providing better security for more users

Server-Gated Cryptography: providing better security for more users

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Read full story Comments { 0 } Download Whitepaper
Securing Microsoft Exchange 2010

Securing Microsoft Exchange 2010

There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is […]

Read full story Comments { 0 } Download Whitepaper

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best […]

Read full story Comments { 0 } Download Whitepaper

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

Malware code is not easily detectable and may infect consumers’ computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business. This paper highlights how attackers distribute malware, what the profit motivations are for modern criminals, and how cybercriminals […]

Read full story Comments { 0 } Download Whitepaper

Proof Positive – Extended Validation SSL Increases Online Sales and Transactions

With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale. Read this white paper and learn how the proper IT security policies can actually drive more sales. It also discusses how Extended Validation (EV) works, […]

Read full story Comments { 0 } Download Whitepaper

Security and Trust: The Backbone of Doing Business Over the Internet

Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn […]

Read full story Comments { 0 } Download Whitepaper

The Top 10 Reports for Managing Vulnerabilities

New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately […]

Read full story Comments { 0 } Download Whitepaper