IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

P K I

RSS Feed   
P K I Reports
 
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

DevOps Without Measurement Is a Fail
sponsored by New Relic
WHITE PAPER: If you're not experiencing the results you want from your DevOps initiative, you need to make sure you're tracking five key areas that will lead to meeting your DevOps goals. Download this whitepaper to learn the rest of the key measurables that will get your DevOps method on track.
Posted: 17 Jun 2019 | Published: 17 Jun 2019

New Relic

Altr's Blockchain-Based Tokenization Provides Transformative Reduction of PCI Scope
sponsored by ALTR
PRODUCT OVERVIEW: Merchants and issuers across the payments space are working to reduce the amount of PCI-sensitive data they store and the number of systems that touch that data, but this can be difficult across legacy systems. In this resource, learn how ALTR Protect can easily integrate into existing infrastructure to ensure that any type of data is protected.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

ALTR

Overcoming the Growing IBM i Skills Gap
sponsored by Connectria
WHITE PAPER: The IBM i OS recently reached an important milestone: its thirtieth birthday. But while its longevity is undoubtedly a testament to its power, there is a growing skills gap as IBM i admins become scarcer and scarcer. Inside, learn how to overcoming this talent gap and keep your mission-critical applications running long into the future.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Connectria

Cognitive Service Management: The Next Stage of ITSM
sponsored by BMC
WHITE PAPER: Is traditional ITSM strategy enough to keep up with spiking user demands, now and into the future? Jump into this white paper to learn how ITSM is evolving through the steady integration of artificial intelligence and machine learning capabilities – a new methodology commonly referred to as cognitive service management (CSM).
Posted: 28 May 2019 | Published: 28 May 2019

BMC
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement