PKI Security White Papers

(View All Report Types)
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Accelerate Value Creation: The Virtuous Cycle of Using Technology to Maximize Business Value
sponsored by SAP America, Inc.
WHITE PAPER: Understanding how IT can drive value and competitive advantage for your company is important for executives in all industries. This SAP Executive Insight paper explores the relationship between IT investment and performance and productivity gains.
Posted: 30 Jan 2009 | Published: 18 Oct 2008

SAP America, Inc.

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Driving Business Value with a Virtualized Infrastructure
sponsored by IBM Software Group
WHITE PAPER: Today, virtualization can enhance nearly every aspect of an IT infrastructure: servers, operating systems, applications, storage, data and networks.
Posted: 05 Dec 2007 | Published: 01 Mar 2007

IBM Software Group

Accelerating the Next Phase of Virtualization
sponsored by Riverbed Technology, Inc.
WHITE PAPER: In this paper, see how wide-area data services (WDS) is now having tremendous success in enabling server virtualization and remote site consolidation.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

Riverbed Technology, Inc.

The Top 12 Most Difficult Active Directory Management Tasks
sponsored by Dell Software
WHITE PAPER: This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

The Art of the Possible: Rapidly Deploying Cost-Effective Energy-Efficient Data Centers
sponsored by IBM
WHITE PAPER: In this white paper, IBM® reveals the next generation data center: scalable, modular data centers (SMDC).
Posted: 08 May 2008 | Published: 01 Feb 2008

IBM

Two Sides of the Same Coin: The Convergence of Security and Compliance
sponsored by Imperva.
WHITE PAPER: Security and compliance issue will continue to dominate IT initiations as long as valuable on customer, employees, patients and business financials is exchanged and stored.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Imperva.

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.