Home
 > Search

Search

Find the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.
WAP Forum Specifies RSA’s RC5 Encryption For Wireless
Written By: P. Hayes Published On: May 9 2000 As the wireless community continues to grow at mind-boggling rates, security has become a key concern, not only in the eyes of users, but also to vendors and service carriers. Read More...
RSA
Source: EMC RSA Security's portfolio of e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize revenue opportunities and operational improvements of e-business while enhancing protection of critical information against unauthorized access and other forms of malicious intent.   Read More...
How Secure is Your E-Mail?
Written By: P. Hayes Published On: October 1 1999 A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read your mail Read More...
Lexiguard&;: The Coming "Adobe Acrobat" of Encryption
Written By: Laura Taylor Published On: January 31 2000 A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat. Read More...
Rocket Software
Founded in 1990, Rocket Software offers a variety of enterprise infrastructure products in the areas of business intelligence (BI), storage, networks, terminal emulation, integration, security, and database. Rocket has licensed its products to a number of major original equipment manufacturers (OEMs), including IBM, Microsoft, RSA, EMC, Nortel, Motorola, and HP. In parallel with a research and development (R&D) investment toward developing software products, Rocket Software began a series of strategic acquisitions in 2000. As a result, Rocket now has over 100 software products that are licensed both through OEM partners and resellers, and via direct sales through Rocket's acquired branded sales channels, such as Mainstar, Servergraph, CorVu, BlueZone, and Seagull. Rocket has more than 700 employees. The company is headquartered in Newton, Massachusetts (US), and has several offices in Eastern and Western Europe, Australia, Asia, and North America. Read More...
Hold Onto Your WAPs, Here Come the Apps!
Written By: P. Hayes Published On: May 19 2000 Due to the seemingly certain global standardization on the Wireless Access Protocol (WAP), Short Message Service (SMS) and the addition of Wireless Markup Language (WML) software vendors are quickly porting applications to service wireless access users. Read More...
PKI and Biometrics Ready for Take-Off
Written By: Laura Taylor Published On: August 7 2000 Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink. Read More...
Your Secrets Should Be Safe with Zoho Vault
Written By: Predrag Jakovljevic Published On: June 6 2013 Both individuals and businesses are becoming increasingly overwhelmed by passwords, because passwords are still the dominant form of user authentication. To manage their burgeoning password portfolios (especially those passwords that must change every once in a while due to corporate practices) users have developed poor practices by storing passwords in spreadsheets, text documents, and other Read More...
Security Stocks Burn Rubber
Written By: Laura Taylor Published On: April 27 2000 Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer? Read More...
Choosing a Key Management Solution
Source: Patrick Townsend Security Solutions
The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment. Read More...
|< <  1 2   > >|
Results 1 - 10 of 15

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.