VeriSign

Displaying 1-40 of 92 results

  • White Papers // Jan 2012

    The Shortcut Guide to Business Security Measures Using SSL rev

    "The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices. Designed for IT professionals and business managers, this guide provides an overview of security threats, their impact on businesses, and,...

    Provided By VeriSign

  • White Papers // Jan 2012

    Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names

    Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs) and United...

    Provided By VeriSign

  • White Papers // Dec 2011

    Data confidential: Keeping private information safe

    Getting data protection right is important. Data loss can lead to a serious loss of customer confidence, which, in some cases, can lead to legal consequences or bring down an entire business. Across Europe, most countries have instituted a data protection authority with powers to oversee and enforce legislation. Technology,...

    Provided By VeriSign

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security

    Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined...

    Provided By VeriSign

  • White Papers // Nov 2011

    Securing your private keys as best practice for code signing certificates

    The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. But a series of recent malware attacks using malicious programs signed with legitimate certificates shows that some developers don't take sufficient precaution. This paper describes...

    Provided By VeriSign

  • White Papers // Oct 2011

    DDoS attack protection: Five best practice tips

    Cybercriminals are smarter, stealthier and more adaptive. Traditional defence methods are no longer able to match the sophisticated disruption of a modern distributed denial-of-service (DDoS) attack. In order to keep safe, organisations must keep up with the hackers. Drawing on successes and hands-on engagements with customers in a range of...

    Provided By VeriSign

  • White Papers // Sep 2011

    Using cloud-based solutions to fight DDoS attacks

    Using cloud-based solutions to fight DDoS attacks Abstract: Distributed-denial-of-service (DDoS) attacks are growing in size, complexity and frequency. Since 2005, the size of attacks has mushroomed 1,000 percent. In a 2011 VeriSign-commissioned survey of 225 IT executives in the US, 63 percent of mid- to large-sized organisations reported having experienced...

    Provided By VeriSign

  • White Papers // Aug 2011

    Protecting users from firesheep and sidejacking attacks with SSL

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise....

    Provided By VeriSign

  • White Papers // Aug 2011

    Malware security report: Protecting your business, customers and the bottom line

    Drive-by malware downloads itself onto a user's system without their consent. Cybercriminals exploit browser and/or plug-in vulnerabilities to deliver the malware by hiding it within a web page as an invisible element (eg, an iframe or obfuscated JavaScript) or by embedding it in an image (eg, a Flash or PDF...

    Provided By VeriSign

  • White Papers // Aug 2011

    Secure your website to protect customers and reputation

    The list of online security woes -- online fraud and identity theft worry your customers while intrusion, spoofing, denial of service (DoS), spyware and data theft are concerns for businesses - can seem endless and daunting. An unsecured website can damage your business and its reputation, and a recent survey...

    Provided By VeriSign

  • White Papers // Aug 2011

    Apps development: Keeping out mobile malware with code signing

    The launch of the Apple App Store marked the birth of the mobile apps market, and the number of available apps has grown exponentially. But as the mobile app business booms, so do the opportunities for malware and other security risks. Developers and networks realise that if customers fear downloading,...

    Provided By VeriSign

  • White Papers // Jul 2011

    Choosing a Cloud Hosting Provider with Confidence

    In this must read white paper, "Choosing a Cloud Hosting Provider with Confidence: VeriSign SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers", you will learn about cloud computing, the new opportunities, the new security challenges and how to ensure your data is safe.

    Provided By VeriSign

  • White Papers // Jul 2011

    Best Practices and Applications of TLS/SSL

    TLS (Transport Layer Security), widely known as SSL (Secure Sockets Layer), is the most well known method to secure your web site. But it can also be used for much more. Read the white paper, "Best Practices and Applications of TLS/SSL," to learn how TLS works, best practices for...

    Provided By VeriSign

  • White Papers // Jul 2011

    Protecting Users From Firesheep and other Sidejacking Attacks with SSL

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the web sessions of other users on that network. As experts proclaimed in reaction...

    Provided By VeriSign

  • White Papers // Feb 2011

    The Business Value of Trust

    Are you looking to increase conversions, boost sales and reduce the number of people who walk away from the checkout process? VeriSign argues that customer trust is at the heart of the matter. Find out what IT managers are doing in the real world to make customers feel safer and...

    Provided By VeriSign

  • White Papers // Feb 2011

    Malware Security Report: Protecting your business, customers, and the bottom line

    This white paper will help you understand the threat from malware and how it can impact your online business. You'll learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible. This paper also highlights techniques administrators can use to detect...

    Provided By VeriSign

  • Case Studies // Jul 2010

    Unique Ecommerce Site Increases Revenue by 70% With Verisign Trust Seal

    Global Village Concerns (GVC) is a branding and marketing services corporation headquartered in San Diego, California. Guided by the company's mission to create a fundamental shift in the way organizations raise capital to support critical programs, GVC's team of world-class branding experts develop logos, mascots, and other designs for schools...

    Provided By VeriSign

  • Case Studies // Jul 2010

    Biotech Company Utilizes Verisign Trust Seal to Help Increase Site Traffic by 41%

    SwitchGear Genomics is a leading provider of materials designed for studying regulatory elements in the human genome. Founded in 2005, the business offers more than 30000 products used by pharmaceutical companies and university laboratories to conduct research and produce biologics such as vaccines and insulin. SwitchGear Genomics wanted to help...

    Provided By VeriSign

  • Case Studies // Jul 2010

    Web-Based Law Firm Increases Sales by 40% With Verisign Trust Seal

    The Trademark Company is a leading web-based law firm that provides the most comprehensive range of trademark services available online. Headquartered in Virginia, the company bundles its services into a variety of packages that clients can purchase at the firm's web site, TheTrademarkCompany.com. The Trademark Company wanted to instill trust...

    Provided By VeriSign

  • White Papers // Jun 2010

    Malware Security Report: Protecting Your Business, Customers, and the Bottom Line.

    Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business. This paper highlights how attackers distribute malware, what the profit motivations are...

    Provided By VeriSign

  • White Papers // Jun 2010

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    The online world can be a scary place as the integration of the Internet into everyone's lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information....

    Provided By VeriSign

  • White Papers // Jun 2010

    Security and Trust: The Backbone of Doing Business Over the Internet

    Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. ...

    Provided By VeriSign

  • White Papers // Jun 2010

    An Evaluation of New Processor Instructions for Accelerating Selected Cryptographic Algorithms

    While there are a plethora of cryptographic techniques, the cost to implement them in terms of wall clock execution time and cost has prevented some adoptions from being practical. Up to date, high performance cryptographic performance may require expensive dedicated hardware which could rely upon proprietary API's to construct applications....

    Provided By VeriSign

  • Case Studies // May 2010

    A Wholesaler of Herbs and Spices Disc Overs Its Growth Pote Ntial With a .com Domain Name

    For Green Earth Products (Green Earth) variety is literally the spice of life! As one of the largest wholesalers of herbs and spices, its name is synonymous with wholesale export and supply of high quality spices and herbs from India. Green Earth wanted a domain name that had global recognition....

    Provided By VeriSign

  • White Papers // May 2010

    Proof Positive - Extended Validation SSL Increases Online Sales and Transactions

    With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale. Read this white paper and learn how the proper IT security policies can actually drive more sales. It also...

    Provided By VeriSign

  • White Papers // May 2010

    Avoid the Hidden Costs of PKI: Achieve Cost-Effective Security With a Managed Solution

    Whether it's complying with mandates to protect sensitive data, enabling trust in a business ecosystem, or securing corporate digital assets against unauthorized access, enterprises turn to Public Key Infrastructure (PKI)-based solutions for the highest levels of protection. Enterprises, government organizations, and digitally connected communities recognize PKI as the gold standard...

    Provided By VeriSign

  • White Papers // May 2010

    An InternetWide View Into DNS Lookup Patterns

    This paper analyzes the DNS lookup patterns from a large authoritative top-level domain server and characterizes how the lookup patterns for unscrupulous domains may differ from those for legitimate domains. The authors examine domains for phishing attacks and spam and malware related domains, and see how these lookup patterns vary...

    Provided By VeriSign

  • White Papers // Apr 2010

    DDoS Mitigation - Best Practices for a Rapidly Changing Threat Landscape

    A Denial-of-Service (DoS) attack occurs when traffic is sent from one host to another computer with the intent of disrupting an online application or service. A Distributed Denial-of-Service (DDoS) attack occurs when multiple hosts are leveraged to carry out and amplify an attack. Attackers usually create the denial-of-service condition by...

    Provided By VeriSign

  • White Papers // Feb 2010

    The Trusted Front Door to the Cloud

    Cloud computing offers organizations new options for scalable, cost-effective, and flexible IT, but to gain the full benefits of cloud-based services, enterprises have to trust the security, policies, and processes of those new services. To extend their IT security beyond their own perimeters, enterprises must first establish a trusted front...

    Provided By VeriSign

  • Case Studies // Feb 2010

    Muvenum Observes an Increase in Online Software Sales the Month Following Deployment of Verisign Code Signing

    MuvEnum is dedicated to enhancing the digital experience by providing affordable, user-friendly software over the Internet. By using what it creates, welcoming feedback from users, thriving on customer satisfaction, and providing free one-on-one support, the company has developed a loyal user base of more than 20,000 people. MuvEnum wanted to...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Opodo: Providing a Secure and Customer Focused Online Travel Portal

    Opodo wanted to safeguard personal and sensitive financial information and demonstrate security consciousness and prove Web site authenticity. As a solution Opodo deployed VeriSign seal, VeriSign Secure Site Pro with Extended Validation (EV), SSL Certificates and VeriSign MPKI for SSL. Choosing the strongest level of encryption available, from the world's...

    Provided By VeriSign

  • White Papers // Jan 2010

    Simplify SSL Certificate Management Across the Enterprise

    The need for SSL Certificates has moved well beyond the "Buy" page to core functions of the enterprise. SSL Certificates are used to protect remote employee and partner communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL Certificates when used to display customer account information, business...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Verisign Seal Boosts Sales 31% and Extended Validation Adds 13% More

    Virtual Sheet Music, Inc. was born when a potential customer could not find a certain service and decided to create it himself. Virtual Sheet Music wanted to inspire customer confidence in the security of online transmissions and build sales by instilling trust and proving authenticity. Virtual Sheet Music deployed VeriSign...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Proof-Reading.com: Registrations Boost 36% Upon Switching to Verisign Seal

    Proof-Reading.com was established to provide high quality business document proofreading and editing services using all the conveniences of the Internet. Customers employ the Web around the clock from virtually anywhere on earth, not only for ordering and paying for the company's services, but also for transmitting their original documents and...

    Provided By VeriSign

  • Case Studies // Jan 2010

    A .com Presence Enables a Handicrafts Manufacturer to Help Make the Right Impression

    Lakshmi Handicrafts, established in 1966, specializes in manufacturing crewel fabric and leather products and has recently ventured into manufacturing. Lakshmi Handicrafts wanted a domain name that was popular and easily recognisable. They wanted a domain name that relates to its line of business. Since the Company deals mainly with international...

    Provided By VeriSign

  • Case Studies // Dec 2009

    The Estate: A Bed and Breakfast Helps Drive Major Increase in Customer Traffic With "The" Right Online Presence - A .Com Presence

    A bed and breakfast start-up targeting foreign tourists and corporate houses in India wanted to establish an online presence with a .com domain name that differentiated it in a crowded market and communicated the unique experience that customers can expect. The challenge was to have a cost-effective Web presence solution....

    Provided By VeriSign

  • Case Studies // Dec 2009

    AC Lens: Gains Ground on the Competition Using VeriSign Extended Validation SSL

    Online contact lens supplier AC Lens switched to VeriSign Extended Validation (EV) SSL Certificates and saw gigantic increases in both conversion rates and revenue per transaction for users who could then see EV's green address bar: 41% and 58% respectively. These two increases combine for an outstanding per-customer revenue difference...

    Provided By VeriSign

  • Case Studies // Dec 2009

    Lion Corporation: EV Delivers 10% More Conversions for Consumer Products Giant Lion Corporation

    Lion Corporation is one of Japan's leading suppliers of consumer products such as shampoo, toothpaste, medicines, detergents, and pet food. The company focuses its E-commerce site on the elderly, who are often new to Internet shopping and especially concerned about divulging personal information. To help quell their fears, Lion adopted...

    Provided By VeriSign

  • White Papers // Nov 2009

    Enabling Secure B2B Collaboration: Cloud-Based Authentication for Next-Generation Extranets

    Combine the corporate extranet - that tried-and-true platform for communicating with customers, partners, and suppliers - with emerging Web 2.0 social media technologies, and what do one get? A whole new way of collaborating and streamlining business processes that transcends organizational boundaries. Wikis, social networks, global sharing of audio, video,...

    Provided By VeriSign

  • White Papers // Jun 2009

    Business Security Measures Using SSL

    Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. The author saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still...

    Provided By VeriSign