• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

keys

Results 201 - 213 of 213Sort Results By: Published Date | Title | Company Name
By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : 
look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
    
Turn
By: VMware, Inc     Published Date: Dec 05, 2013
IT as a service (ITaaS) provides a unique opportunity for IT and line-of-business leaders to realign to transform business. Over the past decade, IT organizations have worked hard to reduce delivery time and costs through automation and commoditization. At the same time, line-of-business owners have demanded more and unique offerings to drive agility and competitive advantage. More recently, the result has been business owners working outside of IT to meet their needs. Now, enabled by cloud computing, ITaaS is catalyzing profound change in IT organizations and the processes companies follow to achieve business goals. Please download the white paper to learn more.
Tags : 
itaas, delivery time, it automation, it commoditization, vmware, networking, it management, knowledge management, enterprise applications, data management
    
VMware, Inc
By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
security
    
IBM
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
By: Venafi     Published Date: Aug 07, 2015
Read this paper and discover how to reduce risk of SSH key misuse and develop a strategy to manage and secure SSH keys.
Tags : 
ssh, security, reduce risk, authentication, secure ssh keys, security application, anti spam, anti spyware, anti virus, application security, security policies
    
Venafi
By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
    
FICO
By: Oracle     Published Date: Oct 29, 2015
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
By: Microsoft Office 365     Published Date: Jun 08, 2016
On this episode we help you navigate the areas of start-up funding, launching and crowdsourcing.
Tags : 
    
Microsoft Office 365
By: Oracle HCM Cloud     Published Date: Nov 30, 2016
The talent landscape is more crowded than ever! Discover the keys to building a magnetic culture that attracts and retains top talent in tough markets. Read more.
Tags : 
    
Oracle HCM Cloud
By: BigCommerce     Published Date: Feb 13, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the box for important keys features, security, and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
bigcommerce, magento, ecommerce, shopify, shopping cart, website, dropshipping, amazon, ebay, google shopping, demandware, wesbite design, ecommerce website, best ecommerce, omnichannel, b2b ecommerce, erp, payment gateway, saas, sell online
    
BigCommerce
By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter