IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

PKI Security

RSS Feed   
PKI Security Reports
 
Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

Microsoft Street Pricing & Sales Tactics
sponsored by ClearEdge
WHITE PAPER: This report provides the actual discounts obtained in hundreds of Microsoft deals for products like M365, O365, SQL Server, Dynamics, Azure and more. Learn typical discount ranges in real deals plus how to jump the curve to get even more, 3 tactics Microsoft reps and resellers use and how to counter them, and more.
Posted: 28 May 2020 | Published: 28 May 2020

ClearEdge

4 Ways to Combat the Cybersecurity Skills Gap
sponsored by Acunetix
RESOURCE: As business environment become increasingly complex, the preexisting cybersecurity skills gap grows. In this article, explore what’s causing the gap, what can be done to narrow it, and 4 best practices for effectively combating the shortage of cybersecurity talent.
Posted: 01 Jun 2020 | Published: 16 Dec 2019

Acunetix

Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $109 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

IT Ops & Security need to join forces
sponsored by Matrix42
WHITE PAPER: In this white paper, take a closer look at the security challenges for security leaders, the burden of GDPR, and discover a checklist for developing an effective security strategy that automates and integrates workspace management with data loss prevention, threat prevention, data encryption, post-infection protection and compliance.
Posted: 27 May 2020 | Published: 27 May 2020

Matrix42
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info