X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
 

 pki token


Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

pki token  the certificate for the PKI is generated. Any number of safe creators can be defined. 2.11. Certificates and keys An important principle and advantage of Secure Folder is that of certificate-based authentication. This method depends on certificates that conform to the X.509v3 standard. The certificates themselves contain various items of information, which allow the software to authenticate the user, and can also serve as authorization for the user to access certain functionalities. A user's certificate

Read More


Public Key Infrastructure (PKI) RFI/RFP Template

PKI Functionality, PKI Technology Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...

Documents related to » pki token

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

pki token  SignOn into virtually any PKI environment. A wide range of smart cards and USB tokens from different manufacturers are supported. The PKCS#11 interface works with smart cards from manufacturers such as Siemens, Giesecke & Devrient, and Aladdin, as well as JavaCards compliant with the GlobalPlatform Specifications such as GemPlus, IBM, Axalto/Schlumberger, and Oberthur. A great variety of the USB tokens supplied by these manufacturers are also compatible. Additionally, Secure SignOn supports a wide range Read More

Application Single-Sign On: Netegrity, Securant, or Evidian?


As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before.

pki token  to single sign-on solutions. PKI offers equally strong authentication capabilities, and may mitigate the risk of security exposures to an even greater degree than single sign-on solutions. However, PKI solutions are more difficult to deploy, and the general IT public has not accepted PKI solutions as much as the market originally anticipated. Firewalls and VPNs offer important security protections, but they have not been optimized for customer, partner, and reseller utilization on the extranet. Firewall Read More

Choosing a Key Management Solution


The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment.

pki token  Key Retrieval Support | PKI Key Management | Key Retrieval from IBM I | Encryption Key Retrieval | Internet Security Association and Key Management | Implementing Key Retrieval | Key Retrieval Perspective | Key Retrieval Guide | DLL Architecture for Key Retrieval | Key Retrieval from Java | Natural Java Key Retrieval Interface | Secure Key Retrieval | Common Key Retrieval Application | Libraries for Key Retrieval | Public Key Cryptography Standard 11 | PKCS 11 Application Interfaces | PKCS 11 Standard | Read More

Lexiguard&;: The Coming "Adobe Acrobat" of Encryption


A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.

pki token  Lexiguard 1.0, this desktop PKI solution is easy to install, easy to use, and may be one of the hottest new security products of the 21st century. The flexible user interface allows you to select your choice of five symmetric encryption algorithms, and four different key sizes starting at 40 bits up through 448 bits through a simple and easy to use click-through GUI. Whether you decide to encrypt your company's strategic five-year plan with DES, 3DES, RC2, RC4, or Blowfish, it works like butter. For you Read More

Entrust


Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include secure socket layer (SSL), authentication, fraud detection, shared data protection, and e-mail security. Entrust's first public-key infrastructure—the world's first commercially available PKI—was released in 1994. Now in its seventh edition, The Entrust Authority PKI product portfolio is now in its seventh edition. The company's worldwide headquarters is located in Dallas, Texas (US), with offices in Australia, Canada, China, Germany, India, Japan, Argentina, and the United Kingdom (UK), as well as other locations in the US (Virginia and California).

pki token  edition, The Entrust Authority PKI product portfolio is now in its seventh edition. The company's worldwide headquarters is located in Dallas, Texas (US), with offices in Australia, Canada, China, Germany, India, Japan, Argentina, and the United Kingdom (UK), as well as other locations in the US (Virginia and California). Read More

Microsoft Business Network (MBN)--Coming of Age? Part Two: Market Impact


Microsoft Business Network (MBN) has the potential to deliver the never really (or hardly ever) realized benefits of early dot-com era Internet trading exchanges or networks that could reasonably and effectively link customers to their trading partners.

pki token  and public key infrastructure (PKI) services, while MBS currently provides business process templates for order-to-cash and supplier visibility processes, with many more to come in the future, most likely from partners. Possibly the biggest reason for watching MBN could be its prospects of aligning with Microsoft's well-known success in selling large volumes of software at reasonably low prices. The estimated retail prices (although the products will only be available through value added resellers Read More

Symantec Swallows AXENT; Takes on Network Associates


Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

pki token  when it comes to PKI development, Protocol Analyzers, and Vulnerability Assessment products. However, if Symantec gobbled up ISS, a PKI vendor, and a competing protocol analyzer tool, Network Associates could be in for a head-on collision with Symantec. The Symantec AXENT firewall beats Gauntlet by a long shot, and on the virus front, they are probably neck and neck. So what does this mean for users? If you're looking for a PKI tool or protocol analyzer, you're still better off calling Network Read More

2011 HR Technology Conference & Expo (Day 1): What Happens in Vegas Shouldn’t Have to Stay in Vegas


Hundreds of industry experts have descended on Las Vegas for the 2011 HR Technology Conference @ Expo (and for other things, such as networking and maybe just a wee bit of gambling), which has been billed as “the world’s best conference on HR Technology.” It’s my second time attending this conference, which is the largest North American gathering of HR professionals, experts, and technology

pki token   Read More

Baan And SSA GT Merge To Form A Mid-Market Empire With An ''Iron Side'' Part Three: Market Impact On SSA GT


Like the previous few SSA GT's acquisitions, this merger too seems aimed at enlarging combined Baan and SSA GT's customer base, market share, and, more importantly, its predictably recurring support revenue and consequently larger R&D pool.

pki token   Read More

Application Giants in Duel and Duet for Users’ Hearts, Minds … and Wallets


While SAP and Microsoft are concurrently partnering for certain initiatives, they are still dueling about who is bigger, better, smarter, whose user screens are prettier and more user-friendly, and so on. But the major question is whether the market and users are ultimately going to be better for it.

pki token  Giants in Duel and Duet for Users’ Hearts, Minds … and Wallets Situational Analysis The relationship between the two software powerhouses, Microsoft and SAP , has been intriguing to put it mildly, at least since Microsoft's entry into the enterprise applications arena in late 2000 (see Microsoft 'The Great' Poised to Conquer Mid-market, Once and Again ). While the relationship has been depicted by many through a myriad of antonyms, such as on-off , hot-cold , or love-hate , currently, it Read More

Legacy Single Sign-On: Novell, Evidian, IBM, PassGo, or Computer Associates?


As the complexity of enterprise systems increases, users are often forced to remember more and more passwords. As the demand on users increases, many users choose to write down their passwords, and by doing so, jeopardize security.

pki token  single sign-on products offer PKI and biometric support. Personalization Although not an essential feature from a functionality standpoint, personalization features disserve some level of consideration. Personalization features vary from product to product, but are typically aimed at making a user's experience easier. Some personalization features provide the user with a custom desktop or application list composed only of resources that they have access to. Other personalization features might include Read More

Thanks to a Smart Little Company called Lexias, CIOs Can Now Empower their Users to Assist in eBusiness Security


Despite advances in security technologies, securing confidential and proprietary information has become more challenging than ever. In an attempt to keep pace with the on-slaught of security woes, new technologies are often unleashed and implemented before due diligence and real understanding of these technologies occurs. New products are selected in haste resulting in the deployment of products that might not be the most optimal ones to get the job done.

pki token  and exchange information using PKI concepts with little understanding of the challenge-response underpinnings. The key features of DigiVault are: Client side software is not required Users can be held accountable for owning the security of their data You can secure and transfer huge 300-500mb files include jpegs and other image formats You own the private labeling of the vault, and can outsource all the maintenance to Lexias Faster and less expensive to implement than a VPN Users: Escapees From Read More

Enterprise Application Integration - Where Is It Now (And What Is It Now)? Part 1: What Is It Now?


Since January 2000 when TEC last addressed the trends in Enterprise Application, there have been massive changes in the overall direction of Application Integration in general and EAI in particular.

pki token  this area, such as PKI and SET. Read More