X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 pki token


Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

pki token  the certificate for the PKI is generated. Any number of safe creators can be defined. 2.11. Certificates and keys An important principle and advantage of Secure Folder is that of certificate-based authentication. This method depends on certificates that conform to the X.509v3 standard. The certificates themselves contain various items of information, which allow the software to authenticate the user, and can also serve as authorization for the user to access certain functionalities. A user's certificate

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » pki token

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

pki token   Read More

Application Single-Sign On: Netegrity, Securant, or Evidian?


As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before.

pki token   Read More

Choosing a Key Management Solution


The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment.

pki token   Read More

Lexiguard&;: The Coming "Adobe Acrobat" of Encryption


A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.

pki token   Read More

Entrust


Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include secure socket layer (SSL), authentication, fraud detection, shared data protection, and e-mail security. Entrust's first public-key infrastructure—the world's first commercially available PKI—was released in 1994. Now in its seventh edition, The Entrust Authority PKI product portfolio is now in its seventh edition. The company's worldwide headquarters is located in Dallas, Texas (US), with offices in Australia, Canada, China, Germany, India, Japan, Argentina, and the United Kingdom (UK), as well as other locations in the US (Virginia and California).

pki token   Read More

Microsoft Business Network (MBN)--Coming of Age? Part Two: Market Impact


Microsoft Business Network (MBN) has the potential to deliver the never really (or hardly ever) realized benefits of early dot-com era Internet trading exchanges or networks that could reasonably and effectively link customers to their trading partners.

pki token   Read More

Symantec Swallows AXENT; Takes on Network Associates


Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

pki token   Read More

2011 HR Technology Conference & Expo (Day 1): What Happens in Vegas Shouldn’t Have to Stay in Vegas


Hundreds of industry experts have descended on Las Vegas for the 2011 HR Technology Conference @ Expo (and for other things, such as networking and maybe just a wee bit of gambling), which has been billed as “the world’s best conference on HR Technology.” It’s my second time attending this conference, which is the largest North American gathering of HR professionals, experts, and technology

pki token   Read More

Baan And SSA GT Merge To Form A Mid-Market Empire With An ''Iron Side'' Part Three: Market Impact On SSA GT


Like the previous few SSA GT's acquisitions, this merger too seems aimed at enlarging combined Baan and SSA GT's customer base, market share, and, more importantly, its predictably recurring support revenue and consequently larger R&D pool.

pki token   Read More

Application Giants in Duel and Duet for Users’ Hearts, Minds … and Wallets


While SAP and Microsoft are concurrently partnering for certain initiatives, they are still dueling about who is bigger, better, smarter, whose user screens are prettier and more user-friendly, and so on. But the major question is whether the market and users are ultimately going to be better for it.

pki token   Read More