VeriSign

Displaying 1-40 of 56 results

  • White Papers // Jan 2012

    The Shortcut Guide to Business Security Measures Using SSL rev

    "The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices. Designed for IT professionals and business managers, this guide provides an overview of security threats, their impact on businesses, and,...

    Provided By VeriSign

  • White Papers // Jan 2012

    Securing Microsoft Exchange 2010 With VeriSign Authentication Services: Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names

    Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs) and United...

    Provided By VeriSign

  • White Papers // Dec 2011

    Data confidential: Keeping private information safe

    Getting data protection right is important. Data loss can lead to a serious loss of customer confidence, which, in some cases, can lead to legal consequences or bring down an entire business. Across Europe, most countries have instituted a data protection authority with powers to oversee and enforce legislation. Technology,...

    Provided By VeriSign

  • White Papers // Dec 2011

    How to choose a Certificate Authority for safer web security

    Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined...

    Provided By VeriSign

  • White Papers // Nov 2011

    Securing your private keys as best practice for code signing certificates

    The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. But a series of recent malware attacks using malicious programs signed with legitimate certificates shows that some developers don't take sufficient precaution. This paper describes...

    Provided By VeriSign

  • White Papers // Oct 2011

    DDoS attack protection: Five best practice tips

    Cybercriminals are smarter, stealthier and more adaptive. Traditional defence methods are no longer able to match the sophisticated disruption of a modern distributed denial-of-service (DDoS) attack. In order to keep safe, organisations must keep up with the hackers. Drawing on successes and hands-on engagements with customers in a range of...

    Provided By VeriSign

  • White Papers // Sep 2011

    Using cloud-based solutions to fight DDoS attacks

    Using cloud-based solutions to fight DDoS attacks Abstract: Distributed-denial-of-service (DDoS) attacks are growing in size, complexity and frequency. Since 2005, the size of attacks has mushroomed 1,000 percent. In a 2011 VeriSign-commissioned survey of 225 IT executives in the US, 63 percent of mid- to large-sized organisations reported having experienced...

    Provided By VeriSign

  • White Papers // Aug 2011

    Malware security report: Protecting your business, customers and the bottom line

    Drive-by malware downloads itself onto a user's system without their consent. Cybercriminals exploit browser and/or plug-in vulnerabilities to deliver the malware by hiding it within a web page as an invisible element (eg, an iframe or obfuscated JavaScript) or by embedding it in an image (eg, a Flash or PDF...

    Provided By VeriSign

  • White Papers // Aug 2011

    Protecting users from firesheep and sidejacking attacks with SSL

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise....

    Provided By VeriSign

  • White Papers // Aug 2011

    Apps development: Keeping out mobile malware with code signing

    The launch of the Apple App Store marked the birth of the mobile apps market, and the number of available apps has grown exponentially. But as the mobile app business booms, so do the opportunities for malware and other security risks. Developers and networks realise that if customers fear downloading,...

    Provided By VeriSign

  • White Papers // Aug 2011

    Secure your website to protect customers and reputation

    The list of online security woes -- online fraud and identity theft worry your customers while intrusion, spoofing, denial of service (DoS), spyware and data theft are concerns for businesses - can seem endless and daunting. An unsecured website can damage your business and its reputation, and a recent survey...

    Provided By VeriSign

  • White Papers // Jul 2011

    Choosing a Cloud Hosting Provider with Confidence

    In this must read white paper, "Choosing a Cloud Hosting Provider with Confidence: VeriSign SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers", you will learn about cloud computing, the new opportunities, the new security challenges and how to ensure your data is safe.

    Provided By VeriSign

  • White Papers // Jul 2011

    Best Practices and Applications of TLS/SSL

    TLS (Transport Layer Security), widely known as SSL (Secure Sockets Layer), is the most well known method to secure your web site. But it can also be used for much more. Read the white paper, "Best Practices and Applications of TLS/SSL," to learn how TLS works, best practices for...

    Provided By VeriSign

  • White Papers // Jul 2011

    Protecting Users From Firesheep and other Sidejacking Attacks with SSL

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the web sessions of other users on that network. As experts proclaimed in reaction...

    Provided By VeriSign

  • White Papers // Feb 2011

    The Business Value of Trust

    Are you looking to increase conversions, boost sales and reduce the number of people who walk away from the checkout process? VeriSign argues that customer trust is at the heart of the matter. Find out what IT managers are doing in the real world to make customers feel safer and...

    Provided By VeriSign

  • White Papers // Feb 2011

    Malware Security Report: Protecting your business, customers, and the bottom line

    This white paper will help you understand the threat from malware and how it can impact your online business. You'll learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible. This paper also highlights techniques administrators can use to detect...

    Provided By VeriSign

  • White Papers // Jun 2010

    Malware Security Report: Protecting Your Business, Customers, and the Bottom Line.

    Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business. This paper highlights how attackers distribute malware, what the profit motivations are...

    Provided By VeriSign

  • White Papers // Jun 2010

    Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

    The online world can be a scary place as the integration of the Internet into everyone's lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information....

    Provided By VeriSign

  • White Papers // Jun 2010

    An Evaluation of New Processor Instructions for Accelerating Selected Cryptographic Algorithms

    While there are a plethora of cryptographic techniques, the cost to implement them in terms of wall clock execution time and cost has prevented some adoptions from being practical. Up to date, high performance cryptographic performance may require expensive dedicated hardware which could rely upon proprietary API's to construct applications....

    Provided By VeriSign

  • White Papers // May 2010

    Proof Positive - Extended Validation SSL Increases Online Sales and Transactions

    With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale. Read this white paper and learn how the proper IT security policies can actually drive more sales. It also...

    Provided By VeriSign

  • White Papers // May 2010

    Avoid the Hidden Costs of PKI: Achieve Cost-Effective Security With a Managed Solution

    Whether it's complying with mandates to protect sensitive data, enabling trust in a business ecosystem, or securing corporate digital assets against unauthorized access, enterprises turn to Public Key Infrastructure (PKI)-based solutions for the highest levels of protection. Enterprises, government organizations, and digitally connected communities recognize PKI as the gold standard...

    Provided By VeriSign

  • White Papers // May 2010

    An InternetWide View Into DNS Lookup Patterns

    This paper analyzes the DNS lookup patterns from a large authoritative top-level domain server and characterizes how the lookup patterns for unscrupulous domains may differ from those for legitimate domains. The authors examine domains for phishing attacks and spam and malware related domains, and see how these lookup patterns vary...

    Provided By VeriSign

  • White Papers // Apr 2010

    DDoS Mitigation - Best Practices for a Rapidly Changing Threat Landscape

    A Denial-of-Service (DoS) attack occurs when traffic is sent from one host to another computer with the intent of disrupting an online application or service. A Distributed Denial-of-Service (DDoS) attack occurs when multiple hosts are leveraged to carry out and amplify an attack. Attackers usually create the denial-of-service condition by...

    Provided By VeriSign

  • White Papers // Feb 2010

    The Trusted Front Door to the Cloud

    Cloud computing offers organizations new options for scalable, cost-effective, and flexible IT, but to gain the full benefits of cloud-based services, enterprises have to trust the security, policies, and processes of those new services. To extend their IT security beyond their own perimeters, enterprises must first establish a trusted front...

    Provided By VeriSign

  • Case Studies // Feb 2010

    Muvenum Observes an Increase in Online Software Sales the Month Following Deployment of Verisign Code Signing

    MuvEnum is dedicated to enhancing the digital experience by providing affordable, user-friendly software over the Internet. By using what it creates, welcoming feedback from users, thriving on customer satisfaction, and providing free one-on-one support, the company has developed a loyal user base of more than 20,000 people. MuvEnum wanted to...

    Provided By VeriSign

  • White Papers // Jan 2010

    Simplify SSL Certificate Management Across the Enterprise

    The need for SSL Certificates has moved well beyond the "Buy" page to core functions of the enterprise. SSL Certificates are used to protect remote employee and partner communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL Certificates when used to display customer account information, business...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Opodo: Providing a Secure and Customer Focused Online Travel Portal

    Opodo wanted to safeguard personal and sensitive financial information and demonstrate security consciousness and prove Web site authenticity. As a solution Opodo deployed VeriSign seal, VeriSign Secure Site Pro with Extended Validation (EV), SSL Certificates and VeriSign MPKI for SSL. Choosing the strongest level of encryption available, from the world's...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Proof-Reading.com: Registrations Boost 36% Upon Switching to Verisign Seal

    Proof-Reading.com was established to provide high quality business document proofreading and editing services using all the conveniences of the Internet. Customers employ the Web around the clock from virtually anywhere on earth, not only for ordering and paying for the company's services, but also for transmitting their original documents and...

    Provided By VeriSign

  • Case Studies // Jan 2010

    Verisign Seal Boosts Sales 31% and Extended Validation Adds 13% More

    Virtual Sheet Music, Inc. was born when a potential customer could not find a certain service and decided to create it himself. Virtual Sheet Music wanted to inspire customer confidence in the security of online transmissions and build sales by instilling trust and proving authenticity. Virtual Sheet Music deployed VeriSign...

    Provided By VeriSign

  • Case Studies // Dec 2009

    Lion Corporation: EV Delivers 10% More Conversions for Consumer Products Giant Lion Corporation

    Lion Corporation is one of Japan's leading suppliers of consumer products such as shampoo, toothpaste, medicines, detergents, and pet food. The company focuses its E-commerce site on the elderly, who are often new to Internet shopping and especially concerned about divulging personal information. To help quell their fears, Lion adopted...

    Provided By VeriSign

  • Case Studies // Dec 2009

    AC Lens: Gains Ground on the Competition Using VeriSign Extended Validation SSL

    Online contact lens supplier AC Lens switched to VeriSign Extended Validation (EV) SSL Certificates and saw gigantic increases in both conversion rates and revenue per transaction for users who could then see EV's green address bar: 41% and 58% respectively. These two increases combine for an outstanding per-customer revenue difference...

    Provided By VeriSign

  • White Papers // Nov 2009

    Enabling Secure B2B Collaboration: Cloud-Based Authentication for Next-Generation Extranets

    Combine the corporate extranet - that tried-and-true platform for communicating with customers, partners, and suppliers - with emerging Web 2.0 social media technologies, and what do one get? A whole new way of collaborating and streamlining business processes that transcends organizational boundaries. Wikis, social networks, global sharing of audio, video,...

    Provided By VeriSign

  • White Papers // Jun 2009

    Business Security Measures Using SSL

    Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. The author saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still...

    Provided By VeriSign

  • Case Studies // Jun 2009

    VeriSign PKI-Based Certificates Are Rock Solid: From the Tumultuous Launch of the Integrated Cargo System to Today

    Representing 250 customs brokers and freight forwarding businesses in Australia, the Customs Brokers and Forwarders Council of Australia Inc. (CBFCA) is an industry association that represents members' interests in various Australian Customs and Border Protection Service consultative forums - providing members with guidance, representation, services and access to the latest...

    Provided By VeriSign

  • Case Studies // May 2009

    Conversions Leap When Oisix Inc. Customers See the EV Green Address Bar

    Oisix Inc. is Japan's biggest online food retailer with annual revenue of over $60 million. They have managed their online shopping site, Oisix.com, since 2000. Every month, Oisix.com sees more than one million unique visitors who come to purchase top quality foods for home delivery. The challenge was to demonstrate...

    Provided By VeriSign

  • Case Studies // May 2009

    Credit Card Sales Increase by Up to 24% When PictureStore Customers See the VeriSign Secured Seal

    PictureStore is Australia's leading online poster, print, and framing retailer with over 150,000 art prints and posters available for sale. Every product ordered on PictureStore.com.au can be block mounted, laminated, and delivered to the buyer's door. The challenge was to keep up fast-paced growth, to minimize costly customer practices such...

    Provided By VeriSign

  • Case Studies // May 2009

    Extended Validation Reduces Cart Abandonment by Over 30% for Hepsiburada.com

    Hepsiburada.com is the number one e-commerce company in Turkey with a market share of approximately 35 percent. The site provides online shoppers with the opportunity to purchase over 180,000 products including computers, office supplies, sports equipment, and much more. The challenge was to decrease shopping cart abandonment and to remain...

    Provided By VeriSign

  • Case Studies // May 2009

    Conversions Rise 20% With Extended Validation SSL for Worldticketshop

    Worldticketshop.com provides top quality e-commerce services in six languages and specializes in tickets that are rare and hard to get. The challenge was to assure customers that their purchases are safe. They also wanted to increase revenue. Worldticketshop.com deployed VeriSign Secured Seal and VeriSign Secure Site Pro with Extended Validation...

    Provided By VeriSign

  • White Papers // May 2009

    Q1 2009 Distributed Denial of Service (DDoS) Report

    Contained within the Distributed Denial of Service (DDoS) report for the first Quarter (Q1) of 2009 are news items regarding noteworthy cyber attacks and botnets, the individuals or organizations responsible for their perpetration, arrests and legal developments stemming from these particular incidents, vulnerabilities and exploits that may enable future Denial...

    Provided By VeriSign

  • Case Studies // Apr 2009

    Online Information Management Provider Leverages a Synchronized Set of Security Services From VeriSign

    Sydney, Australia-based innovator DocLocker Worldwide Pty. Ltd. has devised a secure, remote-hosted, online system for storing, managing and sharing files and documents. The challenge was to provide security for document transfer, management of information and data storage under its set of online services and to reassure visitors to its Web...

    Provided By VeriSign