IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  


RSS Feed    Add to Google    Add to My Yahoo!
PKE Reports
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Removing the Complexity and Guesswork from Your PKI Refresh
sponsored by Venafi
WHITE PAPER: This white paper discusses the challenges of PKI refresh and their impact on security. Read on to learn how you can bolster security with a simplified and streamlined PKI refresh process.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014


Building Blocks of Transparent Web Security: Server-Gated Cryptography
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
Posted: 10 Sep 2007 | Published: 01 Sep 2005

VeriSign, Inc

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Expert Analyst Reviews the Ins and Outs of Database Encryption
sponsored by Guardium, an IBM Company
EGUIDE: In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project.
Posted: 16 Feb 2010 | Published: 16 Feb 2010

Guardium, an IBM Company

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA
Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement