PKI White Papers

In cryptography, a Public Key Infrastructure (PKI) is an arrangement that provides for trusted third party vetting of, and vouching for, user identities. It also allows binding of public keys to users. This is usually carried out by software at a central location together with other coordinated software at distributed locations. The public keys are typically in certificates.
Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Symantec Corporation     Published Date: Feb 25, 2014

Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.

Tags : symantec, mobile, mobile applications, security, pki, security management, mobile device management
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Entrust     Published Date: Aug 03, 2011

Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.

Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: SafeNet     Published Date: Jul 20, 2010

In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!

Tags : safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security, authentication
    
By: Entrust     Published Date: Nov 10, 2009

This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.

Tags : pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: thawte     Published Date: Aug 27, 2008

This guide will introduce you to our Starter PKI Program, explaining how it works as well as the benefits it offers. We’ll also point you to a dummy company on our Web site where you can “test drive” the Program.

Tags : thawte, pki
    
By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008

As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.

Tags : digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
    
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011

Offshoring Is a Cost Effective Solution to Your IT Needs

Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
    
By: The Bunker     Published Date: Nov 30, 2010

What questions should an organization ask about security and availability when contemplating a cloud computing model

Tags : cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam
    
By: Gartner, Inc     Published Date: Oct 28, 2010

New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.

Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
    
By: TraceSecurity     Published Date: Sep 15, 2010

This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.

Tags : penetration, test, pen, tracesecurity, risk, assessment, social, engineering
    
By: xmannnnn     Published Date: Aug 06, 2010

Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.

Tags : active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking, governance
    
By: Okiok     Published Date: Aug 21, 2009

In this white paper, we describe the basic characteristics of DES and triple-DES and look at the security properties that a financial transaction system will want to achieve. We then look at the problems related with a migration from DES to triple-DES; enumerating and discussing several points that we suggest should be considered.

Tags : data encryption, encryption, finance, accounting, migration, data encryption standard, encryption standard, database security
    
By: Ping Identity     Published Date: May 05, 2009

Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: Arcot     Published Date: Jun 04, 2008

In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.

Tags : arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication
    
By: ProofSpace     Published Date: Mar 04, 2008

The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.

Tags : public key, secure content, encryption, proofspace, proofmark, pki, document management, secure content management
    
By: GFI     Published Date: Jun 14, 2007

This document shows you how to use GFI LANguard N.S.S. to identify vulnerabilities on your network (excerpt from manual).

Tags : vulnerability assessment, vulnerability management, auditing, audit, security management, languard, pki, patch management
    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.