trust mark

Results 76 - 100 of 106Sort Results By: Published Date | Title | Company Name
By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, wpa
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
     VeriSign Incorp.
By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy, truste, bbb, reputation, ssl, verisign, scanning
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Jelly Bean increased ROI and conversions by implementing McAfee SECURE™ service and building trust with their visitors. Download today!
Tags : jelly belly, mcafee, secure, service, roi, conversions, trustmark, website security, certification
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how certifying a web site to the McAfee Data Security Standard improved online conversions for Littman Brothers. Download today!
Tags : littman brothers, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ID Card Group increased sales and conversions with McAfee SECURE ™ service. Download today!
Tags : b2b, retailer id, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ROUSH improves online marketing and builds trust and rapport by increasing trust and security of their online site. Learn more today!
Tags : roush, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
     McAfee, Inc.
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Foreclosures.com differentiates itself from competition by displaying the McAfee SECURE™  trustmark. Learn more today!
Tags : foreclosure, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
     McAfee, Inc.
By: Junta42     Published Date: Aug 20, 2009
How do you create trust and meaningful marketing content that doesn't read like a sales pitch? In an age of digital noise and an abundance of information, how do you reach your target audience and become a trusted brand? This eBook will show you how.
Tags : trust, junta 42, marketing content, ebook, target audience, digital noise, branding, loyalty, self-serving promotion, social networking, google, twitter, technorati, boardreader, mastercard, trusted
     Junta42
By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
     Symantec
By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management
     Symantec
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal
     VeriSign Authentication Services, now a part of Symantec Corp.
By: Thawte     Published Date: Oct 05, 2015
Choosing the right SSL solution for your business can be daunting. Recent breaches prove that all Certificate Authorities are not created equal; and with so many certificate types and additional measures including trust marks and Extended Validation available, selecting an SSL solution is challenging too. Discover how selecting the right SSL solution can increase customer trust and conversions in our new whitepaper.
Tags : security solution, ssl solution, certificate types, customer trust, extended validation, security
     Thawte
By: TRUSTe     Published Date: Nov 17, 2009
Best Practices, Do's, and Don'ts for Facebook, Twitter, as well as consumer review sites. TRUSTe shares insights into how to engage, interact, market, and reward friends and fans on the top social media platforms. Download to see how you can increase business on social media today.
Tags : conversion rates, lead quality, response rates, ecommerce, lead generation, demand generation, conversion rates, privacy, trust, credibility, loyalty, revenue, bookings, sales
     TRUSTe
By: Trapit     Published Date: Apr 06, 2015
In the past, simply having a presence on social media was enough for many companies. But social networking sites are changing, and so are buyers. Potential customers want to hear messages tailored specifically for them, and they want to hear those messages from someone they can trust. To maximize the potential of social media, today's marketers have to change their strategies. That's where employee advocacy comes in.
Tags : trapit, employee advocacy, employee marketer, social networking, brand advocation
     Trapit
By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities, security
     GeoTrust
By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to build confidence and profit online using internet trust marks, which will strengthen consumer confidence, drive sales, boost margins, and enhance a website’s competiveness.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : spoofing, phishing, identity theft, lax website, cybercrime, norton, security
     Symantec
By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
     Symantec
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
     ProofSpace
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
     ProofSpace
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
     ProofSpace
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com