X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rsa


RSA
RSA Security's portfolio of e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize

rsa  RSA Security's portfolio of e-security solutions, which include authentication, Web access management and developer toolkits, help organizations to realize revenue opportunities and operational improvements of e-business while enhancing protection of critical information against unauthorized access and other forms of malicious intent.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » rsa

Lexiguard&;: The Coming "Adobe Acrobat" of Encryption


A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.

rsa  Summary Last week at RSA Conference 2000, Lexias, Inc. unleashed a desktop encryption product which someday could become the defacto desktop encryption application of choice if Lexias plays their cards right. Known as Lexiguard 1.0, this desktop PKI solution is easy to install, easy to use, and may be one of the hottest new security products of the 21st century. The flexible user interface allows you to select your choice of five symmetric encryption algorithms, and four different key sizes starting at 40 Read More

How Secure is Your E-Mail?


A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read your mail

rsa  of MIME that adds RSA encryption ( R ivest- S hamir- A dleman) a highly secure cryptography method by RSA Data Security, Inc., Redwood City, CA, (www.rsa.com) for secure transmission. S/MIME was introduced in 1996, and has emerged as the messaging industry's standard for secure e-mail. S/MIME utilizes Public Key Cryptography Standards (PKCS) to ensure cross-platform and multi-vendor compatibility. S/MIME has been, and continues to be widely adopted by the messaging industry. S/MIME, like MIME, uses two Read More

Rocket Software


Founded in 1990, Rocket Software offers a variety of enterprise infrastructure products in the areas of business intelligence (BI), storage, networks, terminal emulation, integration, security, and database. Rocket has licensed its products to a number of major original equipment manufacturers (OEMs), including IBM, Microsoft, RSA, EMC, Nortel, Motorola, and HP. In parallel with a research and development (R&D) investment toward developing software products, Rocket Software began a series of strategic acquisitions in 2000. As a result, Rocket now has over 100 software products that are licensed both through OEM partners and resellers, and via direct sales through Rocket's acquired branded sales channels, such as Mainstar, Servergraph, CorVu, BlueZone, and Seagull. Rocket has more than 700 employees. The company is headquartered in Newton, Massachusetts (US), and has several offices in Eastern and Western Europe, Australia, Asia, and North America.

rsa  (OEMs), including IBM, Microsoft, RSA, EMC, Nortel, Motorola, and HP. In parallel with a research and development (R&D) investment toward developing software products, Rocket Software began a series of strategic acquisitions in 2000. As a result, Rocket now has over 100 software products that are licensed both through OEM partners and resellers, and via direct sales through Rocket's acquired branded sales channels, such as Mainstar, Servergraph, CorVu, BlueZone, and Seagull. Rocket has more than 700 Read More

Your Secrets Should Be Safe with Zoho Vault


Both individuals and businesses are becoming increasingly overwhelmed by passwords, because passwords are still the dominant form of user authentication. To manage their burgeoning password portfolios (especially those passwords that must change every once in a while due to corporate practices) users have developed poor practices by storing passwords in spreadsheets, text documents, and other

rsa  Pro by ManageEngine and RSA Password Engine . Read More

E-mail Encryption: Protecting Data in Transit


Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre-assign various setup options before the software is rolled out, which can be locked so that the user can no longer change the default settings. Learn more about the main properties of Secure Mail and get an overview of the possible configurations the product offers.

rsa   Siemens HiPath SIcurity Aladdin RSA Gemplus Microsoft Cryptographic API (CAPI)-compatible Smartcards and Soft-token   11.4. Supported signature algorithms   11.4.1. S/MIME   RSA/DSA + SHA-1 RSA + RIPEMD-160 RSA + MD5   11.4.2. OpenPGP   SHA-256 SHA-384 SHA-512 SHA-1 RIPEMD- MD5   11.5. Supported encryption algorithms   11.5.1. S/MIME   DES-EDE3-CBC DES3 DES RC2 (40-, 64-, 128-bit) RC4 AES-ECB (128-, 192-, 256-bit) AES-CBC (128-, 192-, 256-bit) AES-OFB (128-, 192-, 256-bit) AES-CFB (128-, 192-, Read More

Secure Transfers of Large Files Over the Internet Using YouSendIt


A growing problem with rich multimedia electronic presentations is their increasing file size. Data files, in general, are larger, making it challenging to send them over the Internet. Most e-mail clients have limitations on attachment sizes, thus securely sending a one hundred megabyte PowerPoint presentation with embedded video over e-mail is nearly impossible. YouSendIt, however, offers solutions consisting of a free web service and the YouSendIt Enterprise Server. Both solutions offer comprehensive security options. The YouSendIt Enterprise Server is an enterprise level, complete large file transfer consisting of a dedicated server that can integrate with existing network security infrastructure.

rsa  secure authentication tokens including RSA SecurID and CryptoCard. This provides additional security for system administrators who want to manage their server remotely. The Enterprise Server service is highly customizable and scalable according to business requirements. There are many reporting and logging options available for administrators as well. The Enterprise Server edition can also automatically integrate into your enterprise's own network authentication if desired. With all of these security Read More

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

rsa  interface standard developed by RSA. It is used to provide access to cryptographic devices such as smart cards or tokens Security Device A smart card or USB token that stores encrypted personal user data such as passwords, private keys, and certificates to protect them from unauthorized third-party access SSO / Single Sign On Single Sign-On provides an authentication process whereby the user only needs to identify himself once during startup with only one single PIN. All other sign-ons are performed Read More

Secure Folder: File or Folder Encryption


Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual property. Secure Folder can provide a secure electronic workstation. Files and folders can be secured for users’ personal use, or configured so they are available for the shared, exclusive use of a selective group. Find out more about a desktop encryption solution.

rsa  PKCS standards defined by RSA have become established as the interfaces with the key deposits. Interoperability for smartcards is assured by the PKCS#11 standard and the PC/SC interface. 2.11.1. Certificate management The basis of any certificate management system is a CA (Certification Authority) , whose tasks are to assign a certificate to each user, issue the key pairs, and sign the certificates as a way of checking their authenticity. Certificates are signed with a electronic signature using the CA's Read More

Choosing a Key Management Solution


The modern enterprise deploys a variety of server platforms, operating systems, and programming languages. A major barrier to deploying encryption has been the challenge of accessing encryption keys from these widely divergent environments. This paper helps define the key management needs of your enterprise, while defining the elements necessary to reduce the technical challenges and cost of deployment.

rsa  standard was developed by RSA Security, but has not gained wide acceptance. Some vendors of key management solutions provide PKCS#11 application interfaces on some platforms, but there remain significant gaps in platform implementations. The PKCS#11 standard defines the application interface, but not the key retrieval interface. Because of the lack of a durable standard for key retrieval, efforts are underway by standards bodies such as IEEE and Oasis to define a standard. These groups have made some Read More