SSL is found all over the Internet, and most Web users take advantage of IT security every day. But not all SSL deployments are the same, and just because a business has an SSL certificate doesn't mean it’s entirely protected. Encryption session keys left on one end of an SSL connection have the potential to one day be obtained and used to decrypt multiple communications. That’s where SSL Forward Secrecy comes in. It’s just one way the method can be used to improve security. Join us for a live eSeminar to learn more about SSL Forward Secrecy and Web security.
Sean Michael Kerner, Senior Editor, eWEEK, InternetNews.com and eSecurityplanet.com
Sal Salamone, Moderator - QuinStreet
Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.
Sponsored by Veeam
Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.
Sponsored by Pure Storage
Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.
Sponsored by CyberArk