public key

Results 76 - 87 of 87Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
     Symantec
By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot, security
     Arcot
By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
     SAP EMEA Global
By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
     SAP
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
     ProofSpace
By: SPYRUS     Published Date: May 12, 2011
Why PKI authentication is more secure
Tags : securid, pki, authentication
     SPYRUS
By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
     Symantec
By: HERE Technologies     Published Date: Jun 14, 2019
Public safety and security organizations can improve emergency response times with reliable, real-time location data. Each additional minute of response time has the potential to save a life or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. Download this infographic to discover: - The three key factors that are slowing down the ETA of your response units - The limitations of legacy location technology - Solutions from HERE
Tags : mapping, public saftey, location data
     HERE Technologies
By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
     DigiCert
By: Quocirca     Published Date: Nov 13, 2007
Businesses across Europe are becoming increasingly reliant on web-enabled applications that are accessed over the public internet. One of the key drivers for this is to open up communications with external organizations that are fundamental to core business processes.
Tags : bpm, business process, web application, customer service, customer satisfaction, business management, order, order management, quocirca, it management, enterprise applications
     Quocirca
By: Cloudamize     Published Date: Apr 04, 2017
As you think about migrating to the public cloud, itís challenging to know where to start. This guide discusses 10 key considerations to address as you think about moving to the cloud and serves as a framework to help you understand which critical decisions you need to make.
Tags : moving to the cloud, cloud computing cost, cloud cost analysis, tco cloud, cloud calculator, cost of cloud computing, cloud computing cost calculator, cloud cost management, cloud migration strategy, migrating to the cloud, cloud migration tools, cloud migration, cloud cost comparison, cloud tco, cloud cost, cloud management, cloud optimization, public cloud, cloud provisioning, capacity planning
     Cloudamize
Start   Previous    1 2 3 4     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com