Skip to main content
 

tls

Results 26 - 50 of 77Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat     Published Date: Nov 23, 2015
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances:
Tags : 
    
Blue Coat
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Florida Hospital Celebration Health has long recognized that nursing is a key factor in the efficient delivery of high quality patient care. Nursing also represents the hospital’s highest cost of labor. Given these factors, administrators at Celebration Health sought business intelligence tools to better understand current nursing performance and pinpoint opportunities for workflow improvements leading to higher patient and staff satisfaction. Read this case study to learn more about how Florida Hospital Pioneers used RTLS and business intelligence to analyze and improve nursing workloads and workflows.
Tags : 
workflow, workload, nursing, healthcare, cost of labor, business intelligence tools, rtls, information technology
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Using LEAN Six Sigma techniques, Central Sterile Processing and Materials Management leaders at Peninsula Regional Medical Center (PRMC) identified specialty bed management as an area ripe for improvement. They were spending too much time looking for these assets and renting too many specialty beds. Initially, the team focused on streamlining its order form process. They soon realized they were getting better—but at the wrong thing. They still weren’t achieving the desired results. Read this case study to learn how Peninsula Regional Medical Center implemented STANLEY Healthcare’s AeroScout® Real Time Locating System (RTLS) and uses real-time location to improve specialty bed management, dramatically reducing rental costs.
Tags : 
healthcare, medical center, medicine, location, bed management, rlts, information technology, practice management
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
In 2010, Children’s Hospitals and Clinics of Minnesota underwent a renovation at its Minneapolis facility. The goal was to transform the entire location into a place where patients and families – who previously received care in a shared-space environment – would enjoy private, family-centric rooms. Such a renovation would also transform the way staff worked together. Minnesota Children’s used the project as an opportunity to reevaluate its entire workflow and communications infrastructure. Read this case study to learn how Minnesota Children's Hospitals and Clinics of Minnesota implemented AeroScout® Real-Time Staff Visibility Solutions to achieve a quieter patient environment, enhanced safety, and improved workflow.
Tags : 
children's hospital, hospital, health care, staff visibility, patient environment, safety, workflow, information technology
    
STANLEY Healthcare
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Découvrez notre rapport semestriel Cloud Security Insights Threat Report 2019 - une étude des menaces basées sur les protocoles SSL/TLS, qui examine le trafic chiffré sur le cloud Zscaler™ entre juillet et décembre 2018. Le rapport, compilé par notre équipe de recherche du ThreatLabZ, se penche sur une variété d’attaques exécutées via SSL et bloquées par Zscaler, parmi lesquelles les attaques de phishing, les botnets, l’exploitation du navigateur et le contenu malveillant.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
Published By: McAfee     Published Date: Nov 19, 2013
This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.
Tags : 
email encryption, email security, tls encryption, transport layer security, on premises, saas
    
McAfee
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : 
tls 1.3
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
Tags : 
tls 1.3
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security
    
F5 Networks Inc
Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
    
Webroot UK
Published By: Mocana     Published Date: Jun 22, 2010
Mocana's NanoSSL is a comprehensive SSL solution designed for efficiency and high performance in embedded and resource-constrained environments. Download the NanoSSL whitepaper and receive a free trial.
Tags : 
mocana, nano ssl, device environment, tls, security services, certificate management, open source
    
Mocana
Published By: SEPATON     Published Date: Jun 23, 2008
This report is a must-read for companies struggling to back up their newly virtualized server environments.  Read this brief to get real-world case studies on how Sterling Testing and Kindred Healthcare have overcome the challenges of protecting VMware environments by implementing high performance virtual tape libraries (VTLs).
Tags : 
backup, recovery, storage, vtl, virtual tape library, virtual storage, storage virtualization, sepaton
    
SEPATON
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
    
Proofpoint
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
A Real-Time Location System (RTLS) that helps monitor equipment, medications, temperature-sensitive products and staff.
Tags : 
tyco, security, rtls asset tracking, location system, real-time
    
Tyco Integrated Security
Published By: DigiCert     Published Date: Jul 16, 2017
Best practices for SSL/TLS admins managing 100s or 1000s of certs
Tags : 
digicert, certificate management, public key infrastructure, ssl, network security, certificate lifestyle
    
DigiCert
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
VeriSign, Inc.
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https
    
VeriSign, Inc.
Published By: Intermec     Published Date: May 07, 2009
For companies that are evaluating mobile computers, several key considerations should drive the decision. Among these are whether the solution fits now, whether it will fit in the future and whether it will pay for itself in the short term.
Tags : 
terminal emulation, rfid, real time location systems, rtls, voice-over-ip, voip migration, mobile computers, proofing
    
Intermec
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
best, practices, applications, tls, ssl, secure, business computing, transport layer security
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi
    
VeriSign Authentication Services, now a part of Symantec Corp.
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.