Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
|
|
|
- Albert Harmon
- 9 years ago
- Views:
Transcription
1 FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet
2 Securing the Future of Trust on the Internet CONTENTS Q1: What is PKI and how does it relate to SSL certificates?... 3 Q2: How do certificate authorities use PKI?... 3 Q3: Why is PKI so important to the future of the Internet?... 3 Q4: Why are some people questioning the future of the PKI ecosystem?... 3 Q5: Are there viable alternatives to PKI?... 4 Q6: What are the CA/Browser Forum Baseline Requirements? Q7: What are the key elements of a robust PKI ecosystem?... 4 Q8: What is an online revocation check and why is it important?... 5 Q9: What is soft-fail behavior and why does it create problems for online revocation checking?... 5 Q10: How can website operators help protect the PKI ecosystem?... 5 Q11: How can I be sure that the websites I visit are safe and trustworthy?
3 Q1: What is PKI and how does it relate to SSL certificates? PKI stands for public key infrastructure. PKI at its base form is an electronic information repository that ties entities to key pairs, but also includes the hardware, software, personnel and practices used to create and manage SSL certificates on the public Internet. TLS/SSL relies on PKI to provide authentication of the server to the client, and to optionally authenticate the client to the server. Q2: How do certificate authorities use PKI? The type of PKI used for SSL/TLS requires a third party to issue certificates used to mediate the authentication between entities interested in engaging in transactions. This third party verifies that the entity requesting a certificate is who or what the entity purports to be and then issues a certificate. Third parties that broker trust in this manner are called Certificate Authorities (CA). Symantec, the #1 provider of SSL online, operates a certificate-based PKI ( Symantec Trust Network ) to enable the worldwide deployment and use of SSL certificates by Symantec, its affiliates, their respective customers, subscribers, and relying parties. 1 Q3: Why is PKI so important to the future of the Internet? PKI is the only technology that can meet the rapidly growing need for online security and trust so that people can connect with confidence and safely share information online now and in the future. There are three key reasons why PKI provides the best platform for online security and trust: Massive scalability PKI has provided a stable platform for the growth of Web-scale e-commerce, and offers the economies of scale required to meet the rapidly growing demand for a secure online experience driven by mobile, cloud and social technologies. Authentication The PKI trust model provides a deterministic way to make assurances about the a) security, b) integrity and c) identity of an organization. Strong encryption PKI enables the use of encryption to ensure the confidentiality and integrity of private data when it is transmitted over the public Internet. PKI is the only single technology platform that delivers the economies of scale necessary for future growth; ensures trust between parties on first contact; and protects the confidentiality and integrity of data in transit on the public Internet. Q4: Why are some people questioning the future of the PKI ecosystem? The CA breaches in 2011 sparked a debate as to whether SSL certificate technology and the entire CA industry that distributes it is fundamentally broken. Fortunately, the answer is categorically and unequivocally no. SSL technology still provides excellent protection against evolving cyber security threats. With the right tools and processes, CAs should be fully capable of providing the greatest assurance possible that their certificates and the websites that use the certificates are genuine and safe for online business. 1 Netcraft SSL Survey, 6/2012; includes subsidiaries, affiliates, and partners. 3
4 However, the events of 2011 are proof-positive that best practices have not been consistently implemented, and that some CAs do not provide equal levels of assurance about security or trust. And yet under the current system, all CAs are trusted equally once they have been added to a browser s root list. This fundamental problem of equal trust without equal assurance must be addressed in order to ensure the future of the PKI ecosystem. Q5: Are there viable alternatives to PKI? A number of emerging technologies, such as DNSSec, Perspectives, and Sovereign Keys, have been proposed as possible solutions to the challenges currently facing PKI and SSL/TLS. While it is important to support and discuss these types of initiatives, they are all considered band-aids that solve point problems, not complete replacements for PKI. Furthermore, these proposals are also largely untested and unproven, whereas PKI has more than a decade of experience and expertise behind it something that can t be developed overnight, regardless of technical merits. Q6: What are the CA/Browser Forum Baseline Requirements? Symantec and other members of the CA/Browser Forum took the first step towards a more robust, sustainable PKI ecosystem in December 2011 with the release of Baseline Requirements for the Issuance and Management of Publicly- Trusted Certificates, the first international baseline standard for the operation of Certification Authorities (CAs) issuing SSL/TLS digital certificates natively trusted in browser software. This standard, which goes into effect on July 1, 2012, describes an integrated set of technologies, protocols, identity-proofing, lifecycle management, and auditing requirements that are necessary for the issuance and management of publicly-trusted certificates. Q7: What are the key elements of a robust PKI ecosystem? The importance of establishing common baseline requirements cannot be overstated. However, these requirements do not address all of the issues relevant to the issuance and management of trusted certificates on the public Internet, and are intended as a starting point of what is an ongoing effort to improve security practices. Symantec strongly believes that a healthy, robust PKI ecosystem requires three key pillars as its foundation: Strong, standardized certificate authority security policies and practices. A robust, agile and highly available digital certificate infrastructure. Stricter security standards for Web browser and Web server software. Some of these objectives can be met simply by following existing standards, guidelines and policies. Other objectives will require the disciplined implementation of stricter policies and stronger security specifications. All of these objectives must be met in order to ensure the long-term health of the PKI ecosystem and to prevent further erosion of trust. 4
5 Q8: What is an online revocation check and why is it important? In addition to protecting valid certificates, CAs have a duty to publish up-to-date status of certificates (whether a certificate is valid or revoked). Historically, they accomplished this by creating a Certificate Revocation List (CRL) and signing it with their private key. Web browsers regularly checked these CRLs to see if any certificates have been revoked. Today OCSP (Online Certificate Status Protocol) is the protocol most commonly used by browsers to obtain the revocation status of an SSL certificate, and obtaining quick responses to OCSP queries is critical to the user experience. The CA/Browser Baseline Requirements state that all CAs must operate and maintain its CRL and OCSP capability with resources sufficient to provide a response time of 10 seconds or less under normal operating conditions. 10 seconds is a very long time for a user to wait for a response. Symantec alone handles on average 4.5 billion OCSP lookups every day, with an average response time of less than half a second, and typically updates its OCSP and CRL systems within 5 minutes of revocation. Q9: What is soft-fail behavior and why does it create problems for online revocation checking? Currently, most Web browsers use a soft-fail approach to online revocation checks; blocking access to the website only if a revoked response is returned. If no response is received, the browser allows the user to continue with no warning. Symantec believes that Web browser developers can and should implement hard fail behavior so that users are stopped from (or at least warned before) proceeding to a website when a revocation check fails. This feature should not impact the user experience if CAs live up to their responsibility and provide timely, reliable responses to online revocation checks. Q10: How can website operators help protect the PKI ecosystem? The first step is to implement Always On SSL, a fundamental, cost-effective security measure that provides end-to-end protection for website visitors. Always On SSL is not a product, service, or replacement for existing SSL certificates, but rather an approach to security that recognizes the need to protect the entirety of a user s session, not just the login screen. Always On SSL starts with the site-wide use of HTTPS, but it also means setting the secure flag for all session cookies to prevent their contents from being sent over unencrypted HTTP connections. For additional security and trust, extended validation (EV) SSL Certificates offer the level of authentication and trigger browsers to give users a very visible indicator that the user is on a secured site by turning the address bar green. This is valuable protection against a range of online attacks. A Symantec sponsored consumer survey of internet shoppers in Europe, the US and Australia showed the SSL EV green bar increases the feeling of security for most (60 percent) shoppers. 2 2 Symantec Online Consumer Study (UK, France, Germany, Benelux, US and Australia) conducted in January
6 SSL/TLS alone can t protect against all Web-based attacks, but CAs such as Symantec offer daily malware and vulnerability scanning as part of their online trust services, helping customers minimize the risk of malware infection, and to remediate malware infections as quickly as possible. Q11: How can I be sure that the websites I visit are safe and trustworthy? It is important to know that SSL/TLS remains the most effective method of secure Web data transmission, and PKI is the best platform for managing SSL certificates at Internet scale. It is equally critical to remain aware of who is behind the security of the website you are doing business with. Are they reputable? Do they have a proven track record for issuance of certificates? Do they have a robust infrastructure in place to prevent these types of attacks? If the answer is no, it is probably not a safe website to use or visit. 6
7 More Information Visit our website To speak with a Product Specialist in the U.S. Call 1 (866) or 1 (650) To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Symantec World Headquarters 350 Ellis Street Mountain View, CA USA 1 (800) Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, BindView, Enterprise Security Manager, Sygate, Veritas, Enterprise Vault, NetBackup and LiveState are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. UID:126/7/2012
Prioritizing Trust: Certificate Authority Best Practices
WHITE PAPER: PRIORITIZING TRUST: CERTIFICATE AUTHORITY BEST PRACTICES White Paper Prioritizing Trust: Certificate Authority Best Practices A Policy for Commercial Certificate Authorities Prioritizing Trust:
Wildcard and SAN: Understanding multi-use SSL Certificates
WHITE PAPER: WILDCARD AND SAN: UNDERSTANDING MULTI-USE SSL CERTIFICATES White paper Wildcard and SAN: Understanding multi-use SSL Certificates Leveraging multi-use digital certificates to simplify certificate
White Paper. Securing the Future of Trust on the Internet The Way Forward for the PKI Ecosystem
WHITE PAPER: SECURING THE FUTURE OF TRUST ON THE INTERNET White Paper Securing the Future of Trust on the Internet The Way Forward for the PKI Ecosystem Securing the Future of Trust on the Internet CONTENTS
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Securing Microsoft Exchange 2010 With VeriSign Authentication Services
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for
Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support
WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS
Simplify SSL Certificate Management Across the Enterprise
Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Introduction The need for SSL certificates has moved well beyond the Buy page to core
Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and
Securing Microsoft Exchange 2010 with Symantec SSL Certificates
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH SYMANTEC SSL CERTIFICATES Symantec Business Guide Securing Microsoft Exchange 2010 with Symantec SSL Certificates Best Practices for Securing Your
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical
White paper. How to choose a Certificate Authority for safer web security
White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online
Security and Trust: The Backbone of Doing Business Over the Internet
WHITE PAPER: SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET White Paper Security and Trust: The Backbone of Doing Business Over the Internet Security and Trust: The Backbone of Doing
Choosing a Cloud Hosting Provider with Confidence
WHITE PAPER: CHOOSING A CLOUD HOSTING PROVIDER WITH CONFIDENCE White Paper Choosing a Cloud Hosting Provider with Confidence Thawte SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES EXTENDED VALIDATION SSL CERTIFICATES: A STANDARD FOR TRUST...1 Who Do You Trust?...1 The
Wildcard and SAN: Understanding Multi-Use SSL Certificates
Wildcard and SAN: Understanding Multi-Use SSL Certificates LEVERAGING MULTI-USE DIGITAL CERTIFICATES TO SIMPLIFY CERTIFICATE MANAGEMENT AND REDUCE COSTS Wildcard and SAN: Understanding Multi-Use SSL Certificates
White Paper. Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
8 Key Requirements of an IT Governance, Risk and Compliance Solution
8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Comodo Certificate Manager. Comodo Enterprise
Comodo Certificate Manager Comodo Enterprise Challenges Enterprises lose track of the SSL certificates on their websites Expired SSL certificates go unnoticed, which leads to customers seeing browser error
White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise
WHITE PAPER: BUSINESS CONTINUITY AND BREACH PROTECTION White Paper Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise Business Continuity and Breach
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Extended Validation SSL Certificates
Extended Validation SSL Certificates A NEW STANDARD TO INSPIRE TRUST, improve confidence and increase sales... INDEX 1. Extended Validation (EV) SSL Certificates solving a trust problem 2. Traditional
Licensing Symantec Certificates
WHITE PAPER: LICENSING SYMANTEC CERTIFICATES White Paper Licensing Symantec Certificates Securing Multiple Web Server and Domain Configurations Licensing Symantec Certificates Securing Multiple Web Server
Gain a New Level of Trust with Extended Validation SSL Certificates
Gain a New Level of Trust with Extended Validation SSL Certificates Higher Standard for SSL Certificates Malicious Internet activities such as phishing and pharming have victimized millions of people.
ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. [email protected] entrust.com
ENTRUST CLOUD SSL Digital Certificates, Discovery & Management +1-888-690-2424 [email protected] entrust.com Entrust Cloud SSL Digital Certificates, Discovery & Management Digital certificates have emerged
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
GeoTrust Extended Validation SSL and Customer Confidence
GeoTrust Extended Validation SSL and Customer Confidence Introduction Suspicion, doubt, reluctance, abandonment, and in some cases refusal to shop online at all anymore are growing characteristics among
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
White Paper. Keeping Your Private Data Secure
WHITE PAPER: Keeping Your Private Data Secure White Paper Keeping Your Private Data Secure Keeping Your Private Data Secure Contents Keeping Your Private Data Secure............................ 3 Why Encryption?......................................
Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
Symantec Business Critical Services for the Enterprise
Symantec Business Critical Services for the Enterprise Information is the currency of today s enterprise. Yet that information is increasingly at risk. Downtime is expensive, and IT departments can t afford
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
Citrix GoToAssist Service Desk Security
Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Simplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
Confidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Symantec Control Compliance Suite. Overview
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
Enterprise Vault 10 Feature Briefing
Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
WHITE PAPER. The latest advancements in SSL technology
The latest advancements in SSL technology CONTENTS + Introduction 3 + SSL overview 3 + Server Gated Cryptography (SGC): 4 Enabling strong encryption for the most site visitors + Extended Validation SSL
Asset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
Cyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage
NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage This document looks at best practices around creating multiple copies of backups on a mixture of tape and deduplicating disk storage.
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Securing Microsoft Exchange 2010 WITH THAWTE SSL CERTIFICATES
Securing Microsoft Exchange 2010 WITH THAWTE SSL CERTIFICATES Strong SSL = Secure Communications There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010, including
Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES Understanding SSL Certificates 2 Secure Socket Layer (SSL) certificates are widely used to help secure and authenticate
EV 10.0.3 Feature Briefing
EV 10.0.3 Feature Briefing Exchange Server 2013 OWA Support This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
Symantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
Managing SSL Security in Multi-Server Environments
Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL
