Search

Find the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.

Refine your search by:
Document Type:

RSA

RSA Security's portfolio of e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize revenue opportunities and operational improvements of e-business while enhancing protection of critical information against unauthorized access and other forms of malicious intent.  
  • Written By:
  • Published On:

WAP Forum Specifies RSA’s RC5 Encryption For Wireless

  • Source:
As the wireless community continues to grow at mind-boggling rates, security has become a key concern, not only in the eyes of users, but also to vendors and service carriers.
  • Written By: P. Hayes
  • Published On: May 9 2000

How Secure is Your E-Mail?

  • Source:
A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read your mail
  • Written By: P. Hayes
  • Published On: October 1 1999

Lexiguard&;: The Coming "Adobe Acrobat" of Encryption

  • Source:
A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.

Rocket Software

  • Source:
Founded in 1990, Rocket Software offers a variety of enterprise infrastructure products in the areas of business intelligence (BI), storage, networks, terminal emulation, integration, security, and database. Rocket has licensed its products to a number of major original equipment manufacturers (OEMs), including IBM, Microsoft, RSA, EMC, Nortel, Motorola, and HP. In parallel with a research and development (R&D) investment toward developing software products, Rocket Software began a series of strategic acquisitions in 2000. As a result, Rocket now has over 100 software products that are licensed both through OEM partners and resellers, and via direct sales through Rocket's acquired branded sales channels, such as Mainstar, Servergraph, CorVu, BlueZone, and Seagull. Rocket has more than 700 employees. The company is headquartered in Newton, Massachusetts (US), and has several offices in Eastern and Western Europe, Australia, Asia, and North America.
  • Written By:
  • Published On:

Hold Onto Your WAPs, Here Come the Apps!

  • Source:
Due to the seemingly certain global standardization on the Wireless Access Protocol (WAP), Short Message Service (SMS) and the addition of Wireless Markup Language (WML) software vendors are quickly porting applications to service wireless access users.
  • Written By: P. Hayes
  • Published On: May 19 2000

Security Stocks Burn Rubber

  • Source:
Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

PKI and Biometrics Ready for Take-Off

  • Source:
Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink.

Your Secrets Should Be Safe with Zoho Vault

  • Source:
Both individuals and businesses are becoming increasingly overwhelmed by passwords, because passwords are still the dominant form of user authentication. To manage their burgeoning password portfolios (especially those passwords that must change every once in a while due to corporate practices) users have developed poor practices by storing passwords in spreadsheets, text documents, and other

Choosing a Key Management Solution

The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment.
  • Written By:
  • Published On:
Results 1 - 10 of 15
|< <
1 2
> >|