How to make shoppers feel safe online and boost your sales at the same time

Methods of Safe Online Shopping

Safe Online Shopping

No wonder consumers still get a shiver of anxiety when they shop
online.In fact, people abandon more than two-thirds of online
purchases due to lack of trust.

This white paper explains the reason behind consumer anxiety and
best practices on how you earn their trust.

EV SSL working

top

 

ev ssl

bottom most ev -sslbottom_ev ssl

 

 

 

Protect Google and Google Apps Accounts with Password Alert

Protect Google and Google Apps Accounts, Today Google launching Password Alert, an open-source Chrome extension that helps protect Google and Google Apps Accounts from phishing attacks and encourages people to use different passwords for different sites, a security best practice.

When an employee with Password Alert installed enters their Google password into any site other than an authentic Google sign-in page (accounts.google.com), that employee will receive an email notifying them to change their password.

In addition, Google Apps admins can choose to deploy an App Engine App that allows for, among other things, auditing and notifications to admins when employees enter their passwords into non-Google websites, and the ability to force those employees to change their passwords after doing so.

As an admin, you can install the Password Alert Chrome extension for all or some members of your domain. To get started with Password Alert, check out the Help Center and FAQ linked below. The Help Center includes a useful Deployment Guide, which outlines the options and requirements for enabling Password Alert for your domain.

Release track:
Rapid release and Scheduled release

Reference by  www.google.com

 

Symantec PGP End Point Encryption Solution

What is Endpoint Encryption?

 

When it comes to encrypting data, there are various encryption strategies.

Disk encryption protects a hard drive in the event of theft or accidental loss by encrypting the entire disk including swap files, system files,

and hibernation files. If an encrypted disk is lost, stolen, or placed into another computer, the encrypted state of the drive remains

unchanged, ensuring only an authorized user can access its contents.

Some endpoint encryption solutions (like Symantec™ Endpoint Encryption) also include support to encrypt files stored on or copied to

removable media devices. As with disk encryption, removable media encryption helps prevent unauthorized access to information on lost or

stolen devices (in this case the devices are USB flash drives, external hard drives (USB, FireWire, and eSATA), SD cards, and compact flash

cards). In this way, organizations can benefit from the productivity gains associated from collaboration using removable storage without

putting data at risk.

How Disk Encryption Works

During the startup process of an operating system, a boot sequence is executed. The boot system is the initial set of operations that the

computer performs when it is switched on. A boot loader (or a bootstrap loader) is a short computer program that loads the main operating

system for the computer. The boot loader first looks at a boot record or partition table, which is the logical area “zero” (or starting point) of

the disk drive.

Disk encryption modifies the boot sector. For example, a computer protected with Symantec™ Endpoint Encryption presents a modified preboot

environment for the user to authenticate to the computer.

This modified pre-boot screen prompts the user for authentication credentials in the form of a passphrase (typically a longer password, often

resembling a sentence). At this point, the computer may ask for additional credentials such as a smart card, token, or other two-factor

authentication.

After the user enters valid authentication credentials, the operating system continues to load as normal and the user can access the

computer.

Most disk encryption software operates in conjunction with the file system architecture. It filters I/O operations for one or more file systems

or file system volumes.

When a drive is encrypted for the first time, it converts unencrypted drive blocks into encrypted blocks one at a time. Disk encryption allows

users to continue working as normal during this initial encryption process by varying the amount CPU power assigned to the initial encryption

process.

When a user accesses a file, disk encryption decrypts the data in memory before it is presented for viewing. If the user makes any changes to

the file, the data is encrypted in memory and written back to the relevant disk drive block just as it would be without encryption. Decrypted

data is never available on the disk. The encryption/decryption process happens at such a speed that it appears completely transparent to the

User.

How Removable Media Encryption Works

Removable media encryption software provides the ability to encrypt files on removable storage devices.

When a user copies files of a system onto a removable storage device, each file is encrypted to a password, a shared key or a certificate. At

the same time, utilities for Windows or Mac systems can be copied (if permitted by policy) allowing authorized access to data without the

endpoint client installed on a machine.

This file encryption can be governed by policy, user action, or Symantec DLP. In the case of Symantec DLP, the Endpoint Prevent software

monitors users’ machines and understands when a person is moving a sensitive file off his computer. With the integration of Symantec DLP

and Symantec Endpoint Encryption, administrators can ensure files with sensitive information that are moving to removable media are

encrypted rather than blocked, allowing business processes to continue in a secure manner.

To access the information, when the user inserts a removable media device like a USB drive with encrypted files into a computer system, the

removable media encryption software will prompt for passphrase, and upon successful authentication, the user can access the file.

Key Features

  • Built PGP Strong – High performing, strong encryption, built with PGP Hybrid Cryptographic Optimizer (HCO) technology and leveraging AES-NI hardware optimization for even faster encryption speeds.
  • Robust Reporting – Administrators can take advantage of out-of-the-box compliance reports or customize their own reports to help ease the burden of proof to auditors and key stakeholders.
  • Active Directory Support – Individual and group policies and keys can be synchronized with Active Directory to help speed deployments and reduce administration burdens.
  • Key Recovery – Multiple recovery options allow organizations to determine the right solution for them to minimize potential lockouts and reduce HelpDesk calls.
  • Single-Sign-On – SSO means fewer passwords for users to remember.

Key Benefits

 
  • User-Friendly – Installation and registration is completely transparent to users, while CPU utilization during initial encryption is minimized to ensure that users can continue being productive while encryption happens in the background.
  • Flexible – Support multi-user deployments in both Active Directory and non-Active Directory environments.
  • Collaborative – Users can access encrypted data on removable media safely even on systems without Symantec Endpoint Encryption installed.
  • Scalable – Scalable management architecture easily adapts to small and large enterprise environments.
  • Stronger Protection – Symantec’s market leading Data Loss Prevention (DLP) software integrates with removable media encryption to analyze data before it’s transferred and automatically encrypt sensitive outgoing data.

Protect Google and Google Apps Accounts with Password Alert

Today we’re launching Password Alert, an open-source Chrome extension that helps protect Google and Google Apps Accounts from phishing attacks and encourages people to use different passwords for different sites, a security best practice.

When an employee with Password Alert installed enters their Google password into any site other than an authentic Google sign-in page (accounts.google.com), that employee will receive an email notifying them to change their password.

In addition, Google Apps admins can choose to deploy an App Engine App that allows for, among other things, auditing and notifications to admins when employees enter their passwords into non-Google websites, and the ability to force those employees to change their passwords after doing so.

As an admin, you can install the Password Alert Chrome extension for all or some members of your domain. To get started with Password Alert, check out the Help Center and FAQ linked below. The Help Center includes a useful Deployment Guide, which outlines the options and requirements for enabling Password Alert for your domain.

Release track:
Rapid release and Scheduled release

Animation improvements in Google Slides

Improvements in Google Slides

Animations are an easy way to make your presentations look more dynamic in Google Slides.  Starting today, you can improve your Slides presentations with two new animations: Appear and Disappear. You can also now set the direction (to and from left, right, top, and bottom) of two previously existing animations: Fly in and Fly out.
Animation-improvements-in-Google-Slides

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Release track:
Rapid release and Scheduled release

More information:
Help Center

Reference by www.google.com

New ways to work together in Classroom

Google Classroom allows teachers to spend less time on paperwork and more time with their students. Starting today, multiple teachers can work and collaborate in a single Classroom class. With the exception of deleting the class altogether, additional teachers can perform all of the same functions as the primary teacher, including:

  • Creating assignments and announcements
  • Viewing and grading submissions
  • Participating in comments on the class’ “stream”
  • Inviting students to the class
  • Receiving email notifications related to the class

 

Teachers can also prep for their classes in advance, saving announcements and assignments as “drafts” and waiting to send them until they’re ready. Like in Gmail, once a new announcement or assignment is created, it will be automatically saved as a draft. Those drafts can then be accessed by multiple teachers, making it simple to collaborate on prep work.

Finally, in response to teacher feedback, we’ve made two additional changes that will make Classroom easier to use:

  • Autosaving grades – Grades will now be autosaved as they’re entered, meaning teachers can grade assignments over multiple sessions but still return those assignments to students all at one time.
  • Improved notifications – Teachers and students will now receive email notifications when private messages are left on assignments.

Release track:  
Rapid release and Scheduled release

More information:
Help Center: Invite teachers to a class

Reference by Google

Google Apps update alert

Flexible editing and sharing options with the latest version of the Google Drive iOS app

Google Apps update

A new version of the Google Drive iOS app is now available in the App Store. New features include:

  • Open, edit and save back to Drive using other document editing apps
  • Back up and share photos and videos from the iOS Photos app

Google apps update -Comprompt

 

Launch Details
Release track:
Launched to both Rapid release and Scheduled release

Rollout pace:
Full rollout (1-3 days for feature visibility)

Impact:
All end users

Reference by Google

Symantec Endpoint Protection 12.1.6

Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high. The threat environment is evolving quickly and given the size and complexity of today’s networks, organizations are struggling to keep up.

 

The latest version of Symantec™ Endpoint Protection 12.1.6 is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the world’s largest civilian threat intelligence network. Symantec Insight™ technology blocks rapidly-mutating malware and enables faster scan times, while SONAR™ stops zero-day threats by monitoring file behavior and blocking suspicious files while they execute. Granular policy settings such as application control and external media control provide an added layer of security. With a single management console and high-powered agent, Symantec Endpoint Protection delivers powerful protection at the endpoint without compromising performance.

The enterprise threat landscape is worsening

Unique threat visibility 

Symantec has strong securityfranchise

 

Key Features SEP 12.1.6 Delivers:

 

  • Unrivaled Security
    • – Stops targeted attacks and advanced persistent threats with intelligent security and layered protection
  • Blazing Performance
    • – Performance so fast your users won’t know it is there
  • Smarter Management
    • – Single management console across physical and virtual platforms with granular policy control
  • 5 Layers of Protection
    • – Symantec Endpoint Protection 12.1.6 provides 5 layers of protection in one high performance agent all managed through a single console
      5 layers of protection
  • Extended Policy Control Features
    Greater controls with System Lockdown, Application and Device Control, Host Integrity Checking and Policy Enforcement and Location Awarenessextended policy control features
  • Optimization for Virtual Environments
    • – Symantec Endpoint Protection protects your high-density virtual environment while maintaining performance levels superior to agentless solutions and providing end-to-end security visibility

 

 

Reference by Symantec

 

 

 

 

You can be more secure in the cloud than in your own data center

IDC shows what factors can make you more secure in the cloud than in an on-premises data centercloud amazon

Are you concerned about how secure your IT assets and applications would be in the AWS Cloud? Independent research firm IDC outlines how to think about the security of applications in the cloud, and how you can be more secure in the AWS Cloud than in your own data center.

Moving to the cloud can simplify and improve your security posture by shifting a large portion of security management burden to an infrastructure environment that’s designed and managed to the specifications of some of the world’s most security sensitive organizations. AWS also provides you the tools to automate many common security tasks. This paper outlines the factors to consider, and the controls you have with AWS, that can make your cloud deployment more secure than your on-premises deployment.

To learn more, read the full white paper »

Reference by Amazon Web Services Team