IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

PKE

RSS Feed   
PKE White Papers (View All Report Types)
 
The Password-less Enterprise: Using PKI To Replace Passwords For Identity And Access
sponsored by Sectigo
WHITE PAPER: Today’s IT security teams need to be able to authenticate identities throughout the enterprise —whether those identities belong to humans, devices, data or applications. Unfortunately, passwords are either too vulnerable or just plain forgotten (or misused). Read this white paper to learn about public key infrastructure, a password-less approach.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Sectigo

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

New Telecom Technologies, New TEM Challenges
sponsored by Calero MDSL
WHITE PAPER: There are many new technologies that are being adopted by businesses at a rapid pace. Each brings new technical challenges, new provisioning challenges, new billing challenges and an exploding universe of endpoints to control. In this white paper, explore the implications that these technologies have on Telecom Expense Management (TEM).
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Calero MDSL

The New Economy
sponsored by Armor
WHITE PAPER: In this year’s Dark Market Report, Armor’s security team takes a closer look into the activities occurring in underground cybercrime communities, such as emerging threats, hacker price lists, trending attack vectors, and more – read on to explore the complete findings from the Armor security team.
Posted: 22 Oct 2020 | Published: 30 Sep 2020

Armor
 
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info