IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

PKI Security

RSS Feed    Add to Google    Add to My Yahoo!
PKI Security Reports
 
An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014

HID

Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Corporation

Managed Public Key Infrastructure: Securing Your Business Applications
sponsored by VeriSign EMEA
WHITE PAPER: The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation.
Posted: 03 Mar 2010 | Published: 01 Dec 2005

VeriSign EMEA

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
sponsored by SSH Communications Security Corp.
WHITE PAPER: While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them.
Posted: 21 May 2012 | Published: 21 May 2012

SSH Communications Security Corp.

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement