IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

PKI Security

RSS Feed   
PKI Security White Papers (View All Report Types)
 
Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

CISO’s Playbook to Cloud Security
sponsored by Lacework
WHITE PAPER: As organizations continue to implement cloud technologies and capabilities, they introduce additional security concerns that the CISO needs to consider. In this playbook, uncover the steps and strategies IT security leaders should consider in order to achieve these positive outcomes.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Lacework

Okta Identity Management for Portals Built on Salesforce.com
sponsored by Okta
WHITE PAPER: Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Okta

A Guide to AIOps: The Future of IT Ops
sponsored by Zenoss, Inc.
WHITE PAPER: Jump inside this guide to learn what features are baked into a modern AIOps toolkit – including which core IT layers use machine learning and which used algorithm-based predictive models.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

Zenoss, Inc.

Reimagined Technology to Future Proof Business
sponsored by Citrix
WHITE PAPER: Learn how Citrix digital workspace solutions can support business and the workforce with a digital workspace.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

TOPICS:  IT Management
Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info