Public Key Infrastructure Research
EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 EnvironmentsSponsored by: EMC & Arrow
This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Sponsored by: MicroScope
A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Sponsored by: OpenTrust
You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Sponsored by: VeriSign EMEA
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Sponsored by: Global Knowledge
The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Sponsored by: ArticSoft
If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.