trust online

Results 26 - 50 of 77Sort Results By: Published Date | Title | Company Name
Published By: Reputation.com     Published Date: Jun 29, 2018
Brand perception begins online, with the local online reputation of doctors, clinics and hospitals. In late 2017, Reputation.com set out to understand how consumers use the internet to look for healthcare services online, particularly when interacting with healthcare-related ratings and reviews. We surveyed healthcare consumers across the U.S. in a representative range of demographic groups for answers to some key questions: • What are consumers and patients really looking for in online reviews? • What ratings and review factors are most important when choosing a doctor? • What sites are most used and trusted for this information? Findings confirmed that online reviews are an essential part of the healthcare consumer’s decision-making. In this report, we’ll look at the key findings in detail.
Tags : 
    
Reputation.com
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Symantec     Published Date: Jun 24, 2015
This white paper illustrates how there’s a better way to inspire consumer confidence and satisfaction, all while increasing conversions, order value, and repeat buyers on your site.
Tags : 
online security, online shopping, customer trust, sales, online purchases
    
Symantec
Published By: Magento     Published Date: Feb 13, 2018
Recommendations to Discuss with Your Development Team and Technology Partners. When buying products online, shoppers have to put their trust into eCommerce stores. They have to trust that their information won't be stolen, that the order will go through and that it will be shipped on-time, to the correct location. When a site is slow, not only does it frustrate online shoppers, it takes away the legitimacy of the site and their trust in it. Poor site performance can cost you sales, revenue, customers, and even a high ranking on search engines. Download the guide to learn how you and your development team can boost site performance.
Tags : 
    
Magento
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Enhance your online brand with trusted security from VeriSign.  In this paper you will gain insights on how to encrypt sensitive information and help improve customer confidence. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, seucrity, security, internet security, security management, customer interaction service, customer service
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark, encryption, online safety, online security, security solutions, verisign, security management, windows
    
VeriSign Incorp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: RingCentral     Published Date: May 14, 2013
Headquartered in San Francisco, with offices in Chicago, Los Angelos, and Miami, TRUSTe helps businesses build consumer trust and increase engagement across online properties. When a company moves to a new location, it has the opportunity to start fresh. Moving to the new offices, TRUSTe decided to explore the benefits of adopting a hosted phone system and doing away with their traditional PBX infrastructure. Learn why TRUSTe finds time savings and independence with RingCentral.
Tags : 
ringcentral, hosted phone systems, phone systems, time savings, independence
    
RingCentral
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication, encryption, sgc, http, anti spam, anti spyware, anti virus, hacker detection, internet security, phishing, ssl, customer relationship management, customer satisfaction
    
VeriSign, Inc.
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security, internet threat management, authentication, encryption, identity management, internet security, security policies, customer relationship management, customer satisfaction, vulnerability management
    
VeriSign, Inc.
Published By: TRUSTe     Published Date: Jun 02, 2010
Ecommerce, Web Development and Design, and Direct Marketing professionals can take advantage of a new program designed to gauge your organization's privacy level. Thousands of companies leave the intricacies of privacy management to TRUSTe, 13 year old leader in online privacy. Gain an overview of the program today.
Tags : 
truste, ecommerce, privacy, security, coppa, transactions, a/b, optimization, user experience
    
TRUSTe
Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe
Published By: TRUSTe     Published Date: Jul 09, 2010
Before diving in to the lucrative world of social media marketing, it is important to first examine the pros and cons of advertising and marketing on the various UGC sites. To help you succeed with your social media marketing initiatives, this TRUSTe white paper will provide with valuable tips that will help you avoid many of the common pitfalls of social media marketing.
Tags : 
truste, ugc, user generated content, twitter, social media, trust, social media marketing, online advertising
    
TRUSTe
Published By: TRUSTe     Published Date: Dec 08, 2010
Before diving in to the lucrative world of social media marketing, it is important to first examine the pros and cons of advertising and marketing on the various UGC sites.
Tags : 
truste, ugc, user generated content, twitter, social media, trust, social media marketing, online advertising
    
TRUSTe
Published By: TRUSTe     Published Date: Dec 08, 2010
In this webinar, nationally-recognized landing page optimization expert Tim Ash and Andreas Ryuta Stenzel, Senior Manager of Online Marketing at TRUSTe, lay out the top 4 secrets to building instant trust online.
Tags : 
truste, trust and security, landing page optimization, online marketing, website design, conversion rates
    
TRUSTe
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how ROUSH improves online marketing and builds trust and rapport by increasing trust and security of their online site. Learn more today!
Tags : 
roush, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : 
container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how Foreclosures.com differentiates itself from competition by displaying the McAfee SECURE™  trustmark. Learn more today!
Tags : 
foreclosure, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
Symantec
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection, intrusion prevention, security management
    
IBM
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.