The document discusses Highwinds' secure delivery and content protection products for securely delivering content and effectively monetizing assets. It describes using SSL to securely deliver streaming and cached content over HTTPS. It also discusses several content protection tools available on the CDN, including URL signing, HTTP referrer restriction, geoblocking, and HTTP basic authentication, that can be used to control access to content.
My 2012 homerun in IT-security: For many years nothing happened in Web security - with respect to security-enabling the HTTP stack. This is not true anymore: game-changing innovations do emerge right now. Their impact will - likely - be pervasive. It is important to understand what exactly is being launched, why this is happening and which forces are driving this. This presentation establishes this context and elaborates on the implications.
The document summarizes the work of the OASIS Trust Elevation Technical Committee, which aims to define standardized methods for service providers to increase the level of trust in an electronic identity during authentication. The committee has completed cataloging existing trust elevation methods and is analyzing them to determine their ability to elevate assurance levels. Future phases will establish a trust elevation protocol. The document outlines five categories of trust elevation methods and provides examples of existing methods.
This document provides information about advertising hotspots in Sabah and Sarawak, with listings of 20 locations and the question "How many times will each advertisement be displayed?". It states that advertisements will be displayed daily for a 1 year minimum contract period. Contact information is provided at the bottom for any inquiries.
Este documento presenta una autoevaluación de rendimiento para coaches que incluye 19 afirmaciones sobre habilidades de coaching. Los coaches deben calificar su habilidad en cada área de 1 (baja) a 4 (alta), y también calificar la importancia de cada habilidad de 1 (baja) a 4 (alta). El objetivo es que los coaches identifiquen áreas de mejora en su desempeño como coach.
Josue solis povedano la importancia del marketing y la estrategia en la empr...Josué Solís Povedano
Este documento presenta 10 fórmulas para aumentar las ventas de una empresa. Estas incluyen mejorar la eficiencia y eficacia comercial, mejorar los atributos del producto, mejorar la calidad del producto o servicio, mejorar los precios, mejorar el mix de productos, mejorar el posicionamiento de la marca, y aumentar la notoriedad de la marca. También se mencionan ejemplos específicos de cómo algunas empresas han aplicado con éxito estas fórmulas para aumentar sus ventas.
Schnell kommt der Frust, wenn man nicht gleich Erfolg mit bezahlten Umfragen hat. Deshalb findest Du hier die 5 Tipps, damit der Einstieg in die Welt der bezahlten Onlineumfragen klappt.
My 2012 homerun in IT-security: For many years nothing happened in Web security - with respect to security-enabling the HTTP stack. This is not true anymore: game-changing innovations do emerge right now. Their impact will - likely - be pervasive. It is important to understand what exactly is being launched, why this is happening and which forces are driving this. This presentation establishes this context and elaborates on the implications.
The document summarizes the work of the OASIS Trust Elevation Technical Committee, which aims to define standardized methods for service providers to increase the level of trust in an electronic identity during authentication. The committee has completed cataloging existing trust elevation methods and is analyzing them to determine their ability to elevate assurance levels. Future phases will establish a trust elevation protocol. The document outlines five categories of trust elevation methods and provides examples of existing methods.
This document provides information about advertising hotspots in Sabah and Sarawak, with listings of 20 locations and the question "How many times will each advertisement be displayed?". It states that advertisements will be displayed daily for a 1 year minimum contract period. Contact information is provided at the bottom for any inquiries.
Este documento presenta una autoevaluación de rendimiento para coaches que incluye 19 afirmaciones sobre habilidades de coaching. Los coaches deben calificar su habilidad en cada área de 1 (baja) a 4 (alta), y también calificar la importancia de cada habilidad de 1 (baja) a 4 (alta). El objetivo es que los coaches identifiquen áreas de mejora en su desempeño como coach.
Josue solis povedano la importancia del marketing y la estrategia en la empr...Josué Solís Povedano
Este documento presenta 10 fórmulas para aumentar las ventas de una empresa. Estas incluyen mejorar la eficiencia y eficacia comercial, mejorar los atributos del producto, mejorar la calidad del producto o servicio, mejorar los precios, mejorar el mix de productos, mejorar el posicionamiento de la marca, y aumentar la notoriedad de la marca. También se mencionan ejemplos específicos de cómo algunas empresas han aplicado con éxito estas fórmulas para aumentar sus ventas.
Schnell kommt der Frust, wenn man nicht gleich Erfolg mit bezahlten Umfragen hat. Deshalb findest Du hier die 5 Tipps, damit der Einstieg in die Welt der bezahlten Onlineumfragen klappt.
Article del diari El Far (www.el-far.com) sobre la trobada d'Emprenedors i Empresaris del Baix Llobregat organitzada per l'Ajuntament de Cornellà, a través del Centre d’Empreses.
A la foto de la portada, Mar Cots, en una de les entrevistes realitzades, una entrevista entre coachs: de coach esportiu a coach digital.
The document provides information about the Congress-Hotel "Puscha" located in Kiev, Ukraine. It has 166 rooms, 9 conference halls that can accommodate 15-300 guests, and modern facilities including restaurants, bars, and a SPA room. The largest conference hall, San Marino Hall, is located in the San Marino Congress Center building and can host conferences, banquets, or concerts for up to 300 people. The hotel aims to provide high-quality accommodations and meeting spaces for business travelers and event planners.
El documento describe un programa de capacitación sobre comunicación telefónica eficiente (CTE) para empleados de Arquimed. El objetivo es mejorar la atención al cliente mediante el uso de técnicas como saludos amables, respuestas rápidas y resolución efectiva de problemas. Un diagnóstico encontró que los tiempos de espera son altos, falta estandarización y elementos diferenciadores, lo que podría afectar negativamente la percepción de los clientes sobre la compañía. El programa incluye sesiones prácticas, evaluación y
Live Chat - The Good, the Bad, and the UglyHobsons
Wendy Price shared her experiences using Live Chat software at the University of Sunderland to provide student support. She provided an overview of Live Chat's functionality and features, including accessibility from web browsers, customization options, queue and visitor intelligence systems, and reporting. She noted the benefits experienced, such as being able to resolve high volumes of queries during peak periods like results days. However, she also mentioned challenges like managing conversations alongside other tasks during busy times and receiving unusual inquiries. Overall, Live Chat proved to be an effective customer service tool for the university to quickly address questions and reassure prospective students.
Using Your Store Location Data to Improve Results by Paul Wicker, Kenshoo - S...SIM Partners
We all know location extensions boost CTR but what else can you do with your store location data? How can you leverage your brick-and-mortar assets to beat up those online-only’s? Is your team wondering what to do with those old yellowpages budgets?
Este documento describe diferentes estrategias y técnicas para realizar búsquedas efectivas en Google. Explica que Google puede corregir errores ortográficos, sugerir términos de búsqueda alternativos y evaluar expresiones matemáticas. También cubre temas como el uso de comillas, signos más y menos para incluir o excluir términos, y cómo no distinguen entre mayúsculas y minúsculas. El objetivo es ayudar a los lectores a optimizar sus búsquedas en Google y encontrar información más re
Tamares Group provides telecommunications services including internet connectivity, data centers, and cloud services. It operates a telecom network across the Middle East and partners with Amazon Web Services to offer direct connections for customers. Tamares aims to deliver secure, high-performance infrastructure and services through its fiber optic network and data centers.
1) The advertisement reviews Bournville chocolate, which uses cocoa beans from Ghana.
2) It depicts the process of cocoa farmers presenting their beans to a white manufacturer in Ghana, who carefully examines each one for quality.
3) When one bean is deemed not high enough quality and starts crying, the farmers must apologize to it before one throws it away, showing how only the finest beans are used to make Bournville.
Cómo aumentar la efectividad de su tienda T-Cuento
El análisis de las ventas de un comercio puede alcanzar conclusiones
erróneas para el negocio. Por ello, conocer cómo se comporta el tráfico
de clientes es fundamental para implantar mejoras operativas en un
establecimiento. Las herramientas de Retail Intelligence ofrecen una visión
global de lo que sucede en el punto de venta
El documento proporciona 5 pasos para actualizar la foto de perfil en el sistema SAIA: 1) iniciar sesión en el sistema, 2) ir a la sección "Mi Perfil" en la navegación izquierda, 3) seleccionar la pestaña "Administración" y luego "Ajuste de Mi perfil", 4) seleccionar la nueva foto de la PC y 5) guardar los cambios al hacer clic en "Actualizar Información Personal".
Contax, Disruptive Innovation and Digital ImagingChris Sandström
One of the oldest camera brands, Contax, will be terminating its camera business. Contax cameras have been produced since 1932 when the brand was launched by Zeiss Ikon. Contax joined with Yashica in the 1960s and became part of Kyocera in the 1990s. Famous photographer Robert Capa used Contax cameras, including during the Normandy landings on D-Day when he took iconic photos with his Contax cameras on Omaha Beach under heavy fire. The end of Contax camera production marks the end of a renowned camera brand with a history in professional photography spanning over 70 years.
CRM in Latin America - CRM Evolution ConferenceJesus Hoyos
The document discusses CRM trends in Latin America. It notes that while large companies often use solutions like Oracle or SAP, open source and cloud-based options like Salesforce are growing in popularity. It also outlines how social media and marketing automation are being integrated with CRM. Local CRM vendors have emerged to address the specific needs of the Latin American market.
The reinforcing effects of graphene oxide (GO) on portland cement paste are investigated. It is dis- covered that the introduction of 0.05% by weight GO sheets into the cement paste can increase the compressive strength and tensile strength Of the cement composite due to the reduction of the pore structure of the cement paste.The overall results indicate that GO reinforcing the engineering properties of portland cement.
This 16 page brochure gives an overview over the trends in magazine-design, book-design, stationery-design. It's a summary of the results of the 4th ICMA - International Creative Media Award.
NISM, apart from various SEBI mandated Certifications and Management Development Programs in the securities market, conducts a one year full-time Post Graduate Programme in Securities Markets (PGPSM). It is an internationally benchmarked Programme focusing on various aspects of securities markets and strengthened with delivery by a team of excellent faculty drawn from the cream of academia, industry and SEBI
The students of this Programme are positioned to take up a wide range of responsibilities, such as Analysts, Investment Managers, Treasury & Risk Managers, Operational Managers, Compliance Officers, Financial Planners and Wealth Managers etc. Graduates of past five batches, have been placed with Analytics firms, Stock-Brokers, Fund Managers, Banks, Financial Advisors, IT companies, Rating Agency, Investment Banks, Registered Valuers etc. To know more, http://nism.ac.in/index.php?option=com_content&view=article&layout=edit&id=698
Offer a trustworthy environment on your web siteKeynectis
Secure Internet transactions are important for building trust with customers and protecting sensitive data. An SSL certificate acts as digital identification that encrypts data exchanged on a website, boosting customer conversion rates. Reasons to install an SSL certificate include establishing trust, attracting new customers who only shop on secure sites, strengthening a company's image, and meeting payment organization requirements. Different types of SSL certificates provide varying levels of verification from simply confirming domain information to fully validating a company's identity and website ownership. Keynectis offers a range of certificate options to suit different needs and help create a trustworthy environment for online activities.
How to offer a trustworhty environment on the web?Keynectis
Secure Internet transactions are important for establishing trust with customers and protecting sensitive data. An SSL certificate acts as digital identification that encrypts data exchanged on a website, boosting customer conversion rates. Keynectis offers various SSL certificate categories at affordable prices to suit different needs, ranging from simply certifying a domain to fully verifying a company's identity and website ownership. Customers should choose a certificate level that provides the security and trust required for their business.
Certificate pinning in android applicationsArash Ramez
Certificate pinning is a security mechanism where an app specifies certificates from trusted authorities and only accepts connections signed by those certificates. This prevents man-in-the-middle attacks. The document discusses implementing certificate pinning in Android apps by configuring the network security configuration file or using third party libraries like OkHttp that have CertificatePinner classes to restrict which certificates an app will accept. It also describes how to retrieve a server's public key hashes to include in the pinning configuration.
NIC 2014 Modern Authentication for the Cloud EraMorgan Simonsen
1. The document provides an introduction to modern authentication methods for cloud applications, focusing on claims-based identity.
2. Claims-based identity uses an abstraction layer where claims about a subject are issued in security tokens by an identity provider and can be verified by a relying party.
3. The document discusses examples of implementing claims-based identity on-premises using Active Directory Federation Services (ADFS) and in the cloud using Azure Active Directory (WAAD) as identity providers.
Article del diari El Far (www.el-far.com) sobre la trobada d'Emprenedors i Empresaris del Baix Llobregat organitzada per l'Ajuntament de Cornellà, a través del Centre d’Empreses.
A la foto de la portada, Mar Cots, en una de les entrevistes realitzades, una entrevista entre coachs: de coach esportiu a coach digital.
The document provides information about the Congress-Hotel "Puscha" located in Kiev, Ukraine. It has 166 rooms, 9 conference halls that can accommodate 15-300 guests, and modern facilities including restaurants, bars, and a SPA room. The largest conference hall, San Marino Hall, is located in the San Marino Congress Center building and can host conferences, banquets, or concerts for up to 300 people. The hotel aims to provide high-quality accommodations and meeting spaces for business travelers and event planners.
El documento describe un programa de capacitación sobre comunicación telefónica eficiente (CTE) para empleados de Arquimed. El objetivo es mejorar la atención al cliente mediante el uso de técnicas como saludos amables, respuestas rápidas y resolución efectiva de problemas. Un diagnóstico encontró que los tiempos de espera son altos, falta estandarización y elementos diferenciadores, lo que podría afectar negativamente la percepción de los clientes sobre la compañía. El programa incluye sesiones prácticas, evaluación y
Live Chat - The Good, the Bad, and the UglyHobsons
Wendy Price shared her experiences using Live Chat software at the University of Sunderland to provide student support. She provided an overview of Live Chat's functionality and features, including accessibility from web browsers, customization options, queue and visitor intelligence systems, and reporting. She noted the benefits experienced, such as being able to resolve high volumes of queries during peak periods like results days. However, she also mentioned challenges like managing conversations alongside other tasks during busy times and receiving unusual inquiries. Overall, Live Chat proved to be an effective customer service tool for the university to quickly address questions and reassure prospective students.
Using Your Store Location Data to Improve Results by Paul Wicker, Kenshoo - S...SIM Partners
We all know location extensions boost CTR but what else can you do with your store location data? How can you leverage your brick-and-mortar assets to beat up those online-only’s? Is your team wondering what to do with those old yellowpages budgets?
Este documento describe diferentes estrategias y técnicas para realizar búsquedas efectivas en Google. Explica que Google puede corregir errores ortográficos, sugerir términos de búsqueda alternativos y evaluar expresiones matemáticas. También cubre temas como el uso de comillas, signos más y menos para incluir o excluir términos, y cómo no distinguen entre mayúsculas y minúsculas. El objetivo es ayudar a los lectores a optimizar sus búsquedas en Google y encontrar información más re
Tamares Group provides telecommunications services including internet connectivity, data centers, and cloud services. It operates a telecom network across the Middle East and partners with Amazon Web Services to offer direct connections for customers. Tamares aims to deliver secure, high-performance infrastructure and services through its fiber optic network and data centers.
1) The advertisement reviews Bournville chocolate, which uses cocoa beans from Ghana.
2) It depicts the process of cocoa farmers presenting their beans to a white manufacturer in Ghana, who carefully examines each one for quality.
3) When one bean is deemed not high enough quality and starts crying, the farmers must apologize to it before one throws it away, showing how only the finest beans are used to make Bournville.
Cómo aumentar la efectividad de su tienda T-Cuento
El análisis de las ventas de un comercio puede alcanzar conclusiones
erróneas para el negocio. Por ello, conocer cómo se comporta el tráfico
de clientes es fundamental para implantar mejoras operativas en un
establecimiento. Las herramientas de Retail Intelligence ofrecen una visión
global de lo que sucede en el punto de venta
El documento proporciona 5 pasos para actualizar la foto de perfil en el sistema SAIA: 1) iniciar sesión en el sistema, 2) ir a la sección "Mi Perfil" en la navegación izquierda, 3) seleccionar la pestaña "Administración" y luego "Ajuste de Mi perfil", 4) seleccionar la nueva foto de la PC y 5) guardar los cambios al hacer clic en "Actualizar Información Personal".
Contax, Disruptive Innovation and Digital ImagingChris Sandström
One of the oldest camera brands, Contax, will be terminating its camera business. Contax cameras have been produced since 1932 when the brand was launched by Zeiss Ikon. Contax joined with Yashica in the 1960s and became part of Kyocera in the 1990s. Famous photographer Robert Capa used Contax cameras, including during the Normandy landings on D-Day when he took iconic photos with his Contax cameras on Omaha Beach under heavy fire. The end of Contax camera production marks the end of a renowned camera brand with a history in professional photography spanning over 70 years.
CRM in Latin America - CRM Evolution ConferenceJesus Hoyos
The document discusses CRM trends in Latin America. It notes that while large companies often use solutions like Oracle or SAP, open source and cloud-based options like Salesforce are growing in popularity. It also outlines how social media and marketing automation are being integrated with CRM. Local CRM vendors have emerged to address the specific needs of the Latin American market.
The reinforcing effects of graphene oxide (GO) on portland cement paste are investigated. It is dis- covered that the introduction of 0.05% by weight GO sheets into the cement paste can increase the compressive strength and tensile strength Of the cement composite due to the reduction of the pore structure of the cement paste.The overall results indicate that GO reinforcing the engineering properties of portland cement.
This 16 page brochure gives an overview over the trends in magazine-design, book-design, stationery-design. It's a summary of the results of the 4th ICMA - International Creative Media Award.
NISM, apart from various SEBI mandated Certifications and Management Development Programs in the securities market, conducts a one year full-time Post Graduate Programme in Securities Markets (PGPSM). It is an internationally benchmarked Programme focusing on various aspects of securities markets and strengthened with delivery by a team of excellent faculty drawn from the cream of academia, industry and SEBI
The students of this Programme are positioned to take up a wide range of responsibilities, such as Analysts, Investment Managers, Treasury & Risk Managers, Operational Managers, Compliance Officers, Financial Planners and Wealth Managers etc. Graduates of past five batches, have been placed with Analytics firms, Stock-Brokers, Fund Managers, Banks, Financial Advisors, IT companies, Rating Agency, Investment Banks, Registered Valuers etc. To know more, http://nism.ac.in/index.php?option=com_content&view=article&layout=edit&id=698
Offer a trustworthy environment on your web siteKeynectis
Secure Internet transactions are important for building trust with customers and protecting sensitive data. An SSL certificate acts as digital identification that encrypts data exchanged on a website, boosting customer conversion rates. Reasons to install an SSL certificate include establishing trust, attracting new customers who only shop on secure sites, strengthening a company's image, and meeting payment organization requirements. Different types of SSL certificates provide varying levels of verification from simply confirming domain information to fully validating a company's identity and website ownership. Keynectis offers a range of certificate options to suit different needs and help create a trustworthy environment for online activities.
How to offer a trustworhty environment on the web?Keynectis
Secure Internet transactions are important for establishing trust with customers and protecting sensitive data. An SSL certificate acts as digital identification that encrypts data exchanged on a website, boosting customer conversion rates. Keynectis offers various SSL certificate categories at affordable prices to suit different needs, ranging from simply certifying a domain to fully verifying a company's identity and website ownership. Customers should choose a certificate level that provides the security and trust required for their business.
Certificate pinning in android applicationsArash Ramez
Certificate pinning is a security mechanism where an app specifies certificates from trusted authorities and only accepts connections signed by those certificates. This prevents man-in-the-middle attacks. The document discusses implementing certificate pinning in Android apps by configuring the network security configuration file or using third party libraries like OkHttp that have CertificatePinner classes to restrict which certificates an app will accept. It also describes how to retrieve a server's public key hashes to include in the pinning configuration.
NIC 2014 Modern Authentication for the Cloud EraMorgan Simonsen
1. The document provides an introduction to modern authentication methods for cloud applications, focusing on claims-based identity.
2. Claims-based identity uses an abstraction layer where claims about a subject are issued in security tokens by an identity provider and can be verified by a relying party.
3. The document discusses examples of implementing claims-based identity on-premises using Active Directory Federation Services (ADFS) and in the cloud using Azure Active Directory (WAAD) as identity providers.
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
Our Chief Product Officer, Lila Kee spoke at Cloud Computing Expo in New York.
The talk is about how cloud-based service providers must build security and trust into their offerings. It is imperative that as these cloud-based service providers make identity, security, and privacy easy for their customers as customers become more reliant on these offerings. The slides include the best practices for cloud-based service providers and how a superior user experience that is backed by security features will enable business growth and reduce customer churn.
You can find out more in our webinar: https://www.globalsign.com/en/lp/webinar-the-business-advantages-of-ssl-as-a-service/
WordCamp Raleigh 2017 - Move from HTTP to HTTPS or become irrelevant - Peter ...Peter LaFond
If you own a website, specifically a WordPress site, it's time to move from HTTP to HTTPS. Google is implementing a Carrot-and-Stick plan to get you there. This WordCamp talk touched on the basics of HTTPS/SSL/TLS and Google's plan to make the web more secure. These slides cite links with supporting information.
This document discusses certificate authorities (CAs) and provides an example scenario for securing a web server using a CA. It defines a CA as an entity that issues digital certificates for use by other parties in public key infrastructure schemes. There are commercial CAs, as well as CAs run by institutions and governments. The document then describes the process a CA goes through to issue a certificate and how users can verify certificates. It provides a list of common CAs. Finally, it presents a scenario where a web server obtains a server certificate from a CA to secure its SSL port, and clients can obtain client certificates from the CA's website to access the secure site.
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
Scott Rea presented on using PKI for IoT. PKI traditionally establishes trust between previously unknown parties on a network by binding identities to cryptographic keys through certificates issued by a trusted certification authority. However, PKI faces challenges for IoT where device attributes like ownership and location may frequently change, requiring dynamic authorization instead of long-term identity certificates. Separating identity from dynamic authorization through a linked but separate mechanism could provide more efficient management of trust as devices and their attributes change over time in IoT networks.
This document discusses various aspects of web security, including the need for security when transmitting data over the internet, common security measures like authentication, authorization, encryption, and accountability. It describes techniques for securing web applications such as SSL, firewalls, VPNs. It provides details on authentication methods like basic authentication and form-based authentication. It also explains concepts like SSL certificates, VPN types, and how firewalls and SSL work.
The document discusses Amazon Managed Blockchain, a fully managed service that makes it easy to create and manage scalable blockchain networks. It allows customers to set up blockchain networks using popular open-source frameworks like Hyperledger Fabric and Ethereum. Amazon Managed Blockchain handles complex tasks like provisioning hardware and managing the networks so customers don't have to deal with these challenges. It also integrates with other AWS services and provides reliability, security, low costs and ease of use. An example is provided of how Nestle uses it for supply chain management.
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
This document discusses using automation tools and protocols to establish trust in a dynamic cloud environment. It proposes using a public key infrastructure (PKI) with automated certificate lifecycle management to enable end-to-end encryption. The Automated Certificate Management Environment (ACME) protocol is highlighted as a way to automate interactions between clients and certificate authorities for certificate issuance and renewal without manual steps. The architecture described uses open source tools like Boulder and Certbot to implement the ACME protocol and automate certificate distribution and management at scale.
Cloudflare’s SSL for SaaS offering provides SaaS providers the opportunity to extend the security, performance, and encryption benefits of Cloudflare’s network to their end customers. This includes management of the entire SSL certificate lifecycle for custom vanity domains.
View the slides to learn:
-The performance, security, and encryption benefits of Cloudflare for SaaS providers and their end customers.
-How SSL for SaaS manages the entire SSL certificate lifecycle for SaaS providers and their end customers, from purchase to renewal.
-The hurdles of building and managing an in-house SSL solution for custom domains.
-How SSL for SaaS seamlessly delivers encryption to custom domains.
Microservices architecture is becoming a prominent design principle and a service development methodology, we have now started to see many microservices in production. Yet, security is a less concerned aspect, most of the time development teams are much focus on edge security but due to distributed and disposable nature of microservices, it's equally important to pay attention to securing service-to-service communication both during the transmission and sharing end-user context among services in order to cover vast attack surface.
Don't Get Schooled: Performance and Security Tips from a Leading Education Sa...Meghan Weinreich
As the SaaS market continues to swell and become an integral component of business infrastructure, performance and security remains top-of-mind for both SaaS providers and their customers. Underperforming applications and those vulnerable to attacks will inevitably experience a negative impact on revenue, end-user engagement, brand reputation, and customer churn.
View this presentation featuring our customer expert from School Loop, a SaaS portal for K-12 schools to communicate internally within schools and externally with students and parents. You will learn:
-How School Loop accelerates performance of their application used by 3 million students and parents, even during periods of seasonal or spiky traffic
-How to prevent breaches of confidential data and communications via SSL
-The benefits of setting up a branded, user friendly custom domain for your customers
-How you can ensure uptime against DDoS attacks with the help of Cloudflare
This document provides an overview of Module 6 which focuses on implementing an Active Directory Certificate Services (AD CS) infrastructure. It discusses using certificates for various purposes like SSL, digital signatures, content encryption, and authentication. It also provides details on deploying and configuring a PKI hierarchy with both a standalone root CA and an enterprise subordinate CA. The last section outlines a lab scenario for students to deploy and configure their own CA hierarchy to address an organization's increased security requirements.
The document discusses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols for securing communications over a network. It explains that SSL uses certificates and keys to encrypt data between a client and server so only they can access it. It then describes the different versions of SSL, how SSL establishes encrypted connections, and provides diagrams of SSL and mutual authentication processes.
Similar to Highwinds Secure Delivery Content Protection And Monetization 120217a (20)
Highwinds Secure Delivery Content Protection And Monetization 120217a
1. Secure Delivery, Content Protection
and Monetization
Use SSL and Configurable Protection Policies to Securely
Deliver and Effectively Monetize Your Content
WWW.HIGHWINDS.COM
2. Secure Protect $ Monetize
Monetization strategies require content owners to protect their assets from viral distribution.
Highwinds enables our customers to create delivery business rules enforced by the CDN. With
Highwinds’ secure delivery and content protection products, end users must view the media
through the workflow designated by the publisher.
Secure Delivery with HTTPS
SSL (Secure Sockets Layer)
HTTP Streaming and HTTP Caching can be secured using SSL. HTTPS offers the same feature-rich delivery capabilities
as standard HTTP with the addition of encrypted communication and secure identification of the CDN caching and
streaming platforms, resulting in protection of your content.
SSL can be used to protect streaming content, static website assets, games and more. Additionally, SSL enables
publishers to deliver unsecured content to secured web pages to avoid browser warning messages.
Benefits
Protect your valuable assets
• rohibit users from intercepting your stream by protecting it
P
between the server and the network
SSL CERTIFICATE TYPES
What can’t be stolen must be bought
• rofit from your assets by eliminating illegal distribution of
P Highwinds Wildcard Certificate
your content • ses Highwinds’ URLs
U
• o set-up fee and no monthly certificate
N
Perform both HTTP and HTTPS using the same host name
maintenance fee
• any CDNs make it difficult to manage content offered via
M
HTTP and HTTPS, but Highwinds uses proprietary software to
allow delivery of both protocols using a single virtual host Custom Certificates
• se a certificate from a signing authority of your
U
Simplified set-up choice
• elf-service management of SSL certificate configuration
S
• an be used to create your own wildcard
C
once certificate is installed
certificate
Control access rules on a per directory basis • ne-time set-up fee and monthly certificate
O
• n StrikeTracker 2 you can add SSL to existing content with
I maintenance fee
one click
Shared Certificates
Secure ingest
• lso called Subject Alternative Name (SAN)
A
• y combining secure ingest and secure delivery, content is
B
certificates
protected from both your origin to the CDN and from the
CDN to the end user • hared by a number of customers
S
• ne-time set-up fee and monthly certificate
O
Protect your users’ identities
maintenance fee
• ith secure delivery, your customer’s identity and personal
W
information are protected, giving them confidence in viewing
your content, playing your games, etc.
Secure static asset delivery
• y securing the delivery of static site assets, you avoid
B
browser warnings that can scare away customers
3. Content Protection
Highwinds enables the configuration of content protection policies inside the
StrikeTracker 2 console, often with just a single click. By setting policies that are enforced
by the CDN, your content can only be delivered through the workflow you determine.
URL Signing
URL Signing is the most popular content protection product offered by Highwinds. CDN account owners publish
content with a query string parameter token that includes an optional time-to-live (TTL). This private token can only
be generated by the publisher and can be used to create unique publishing URLs for each end user request.
URL security prevents free distribution of content outside the workflow designated by the publisher:
• f an end user tampers with the URL, their request for CDN content is denied
I
• f a URL has a TTL in the past, end user requests for CDN content are denied
I
• upports optional IP address and User-Agent enforcement
S
• se partial URL signing to provide folder-level access to content, or groups of files using a common prefix
U
HTTP Referrer Restriction
HTTP Referrer Restriction is a security product that prevents CDN publishing URLs from being freely distributed
on unauthorized websites (also known as hot linking or deep linking). Publishers configure one or more websites
that end users can visit and successfully request content hosted by the CDN. When an end user request is made,
Highwinds compares the HTTP Header Referrer field with the list of approved websites. If the end user is not visiting
an approved website, the CDN will issue an HTTP 403 – Access Denied response.
Geoblocking
Geoblocking allows publishers to restrict content to end users in specified locations. The IP address of incoming
requests is checked against a current list of IP allocations. If an end user’s IP address is not found in the exclude list,
they are allowed access to the content by default. The feature has both include and exclude lists which are used to
target the allowed audience.
• eoblocking Granularity: ASN, Continent, Country, Region, City, Postal Code, Area Code, and DMA (US Metro
G
Code)
HTTP Basic Authentication
With Basic HTTP Authentication, end users are prompted to enter login credentials that are approved by the
publisher’s web server before the media is delivered. HTTP Authentication policies are enabled and managed in the
StrikeTracker 2 portal.
4. Secure Corporate
Use SSL for secure delivery of HTTP Streaming and Headquarters
HTTP Caching
807 W. Morse Boulevard
Protect Winter Park, FL 32789
Several CDN-enforced content protection tools
available Phone: +1.407.215.2400
Toll Free: +1.866.872.0357
$Monetize Email: info@highwinds.com
Create monetization strategies that are support by www.highwinds.com
CDN security and protection policies
North America
Costa Mesa, CA
+1.714.727.2800
Phoenix, AZ
+1.602.515.0931
South America
São Paulo, BR
+55.11.3711.9307
www.highwinds.com/brazil
Europe
Amsterdam, NL
+31.20.2629545
London, UK
+44.20.7096.5940
WWW.HIGHWINDS.COM