IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Asymmetric Cryptography

RSS Feed   
Asymmetric Cryptography White Papers (View All Report Types)
 
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


4 Tactics to Protect Against Harmful Ransomware
sponsored by CyberMaxx
WHITE PAPER: Federal agencies warn organizations to adopt a heightened state of awareness following the rampant ransomware attacks of early 2021. In this white paper, experts share 4 proactive measures you can take to protect your organization. Take this short survey to unlock the tactics.
Posted: 16 Aug 2021 | Published: 16 Aug 2021

TOPICS:  Security

Ready to Modernize IT? Start With Automation.
sponsored by Insight
WHITE PAPER: For enterprises looking to modernize, automation offers a host of benefits. From optimizing functionality to freeing up staff to focus on strategic initiatives, IT automation supports a wide range of transformation goals. This whitepaper provides tips and best practices for successful automation. Access it here.
Posted: 08 Nov 2021 | Published: 08 Nov 2021

TOPICS:  IT Management
Insight

IBM Gotchas Guide
sponsored by ClearEdge
WHITE PAPER: Complex contract language and licensing practices make increased costs and audit exposure nearly inevitable unless you understand the risks hidden in your IBM agreements. This easy-to-digest guide shares pitfalls that can lead to lost credits, best practices to mitigate price increases, and more.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences