PKI White Papers

In cryptography, a Public Key Infrastructure (PKI) is an arrangement that provides for trusted third party vetting of, and vouching for, user identities. It also allows binding of public keys to users. This is usually carried out by software at a central location together with other coordinated software at distributed locations. The public keys are typically in certificates.
Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures, access control, application security, authentication, identity management, password management, pki
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures, application security, authentication, identity management, internet security, password management, pki
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.

Tags : security, security application, pki, authentication, internet security, security access, access control, application security, email security, security management
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates, application security, authentication, identity management, internet security, network security appliance, password management, security management
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates, application security, authentication, identity management, internet security, network security appliance, password management, security management
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This infographic illustrates how Entrust PKI Technology is still a key player and global leader in online security.

Tags : security, internet security, online security, pki, entrust pki technology, application security, authentication, security management, security policies
    
By: Venafi     Published Date: Aug 07, 2015

Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.

Tags : pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security, anti spam, anti spyware, anti virus, application security, pki, security management, security policies
    
By: Vectra Networks     Published Date: Aug 03, 2015

The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.

Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management, best practices, advanced persistent threat, apt, ids, ips, malware, security insight, threat landscape, application security, hacker detection, internet security, intrusion detection
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
    
By: Symantec Corporation     Published Date: Feb 25, 2014

Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.

Tags : symantec, mobile, mobile applications, security, pki, security management, mobile device management
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, authentication
    
By: Entrust Datacard     Published Date: Aug 03, 2011

Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.

Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone, authentication, encryption, bluetooth, mobile data systems, mobile workers, pda
    
By: SafeNet     Published Date: Jul 20, 2010

In this business environment, strong authentication-using multiple factors to ensure users are indeed who they claim to be-is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. Read this white paper to find out more!

Tags : safenet mobile, sms authentication, remote access, customer satisfaction, tco, certificate-based authenticators, pkiinformation security, authentication, pki, mobile workers, smart phones, wireless communications, wireless messaging, wireless phones, wireless security, customer service, information management, messaging
    
By: Entrust Datacard     Published Date: Nov 10, 2009

This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.

Tags : pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust, encryption, network security certification
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
By: thawte     Published Date: Aug 27, 2008

This guide will introduce you to our Starter PKI Program, explaining how it works as well as the benefits it offers. We’ll also point you to a dummy company on our Web site where you can “test drive” the Program.

Tags : thawte, pki
    
By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008

As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.

Tags : digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management, secure content management
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory, server utilization, memory ballooning, vmkernal swapping, capacity planning, vmware esx 4.0, active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking
    
Previous   1 2    Next    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.