Entrust

Displaying 1-4 of 4 results

  • White Papers // Jul 2009

    Why Outsourcing Your PKI Provides the Best Value: A Total Cost of Ownership Analysis

    Once one conclude that one needs a certificate to exchange information online securely, turn on the security inherent in existing applications, or authenticate to users, computers, VPN, the Web, or buildings, the next point of determination is: how can I do this cost-effectively without forfeiting quality? The answer is simple:...

    Provided By Entrust

  • White Papers // Jan 2009

    Exploiting Weaknesses in the MD5 Hash Algorithm to Subvert Security on the Web

    A group of renowned researchers has published some of the details of their exploitation of a vulnerability in the MD5 hash algorithm. The advance they describe would allow an attacker to create fraudulent Web-site certificates with which they could launch a phishing or man-in-the-middle attack on an eCommerce, eBanking or...

    Provided By Entrust

  • Case Studies // Jan 2009

    Credit Suisse Group Uses Entrust Technology to Secure Desktop Applications

    Credit Suisse Group is a leading global financial services company headquartered in Switzerland. Credit Suisse Group needed security capabilities that would provide an effective means of authenticating users and ensuring accountability and confidentiality. Credit Suisse Group's main focus when choosing the Entrust solution was to achieve more effective authentication of...

    Provided By Entrust

  • White Papers // Mar 2008

    Encryption 101: Eight Common Encryption Issues Facing Organizations Today

    Pressures are mounting for organizations to implement encryption solutions. From regulatory compliance, to partner demands and the staggering costs of data loss, encryption projects are on the rise. This paper explores the most common issues organizations face when making decisions about which types of encryption solutions to use. Having a...

    Provided By Entrust

  • White Papers // Jul 2009

    Why Outsourcing Your PKI Provides the Best Value: A Total Cost of Ownership Analysis

    Once one conclude that one needs a certificate to exchange information online securely, turn on the security inherent in existing applications, or authenticate to users, computers, VPN, the Web, or buildings, the next point of determination is: how can I do this cost-effectively without forfeiting quality? The answer is simple:...

    Provided By Entrust

  • Case Studies // Jan 2009

    Credit Suisse Group Uses Entrust Technology to Secure Desktop Applications

    Credit Suisse Group is a leading global financial services company headquartered in Switzerland. Credit Suisse Group needed security capabilities that would provide an effective means of authenticating users and ensuring accountability and confidentiality. Credit Suisse Group's main focus when choosing the Entrust solution was to achieve more effective authentication of...

    Provided By Entrust

  • White Papers // Mar 2008

    Encryption 101: Eight Common Encryption Issues Facing Organizations Today

    Pressures are mounting for organizations to implement encryption solutions. From regulatory compliance, to partner demands and the staggering costs of data loss, encryption projects are on the rise. This paper explores the most common issues organizations face when making decisions about which types of encryption solutions to use. Having a...

    Provided By Entrust

  • White Papers // Jan 2009

    Exploiting Weaknesses in the MD5 Hash Algorithm to Subvert Security on the Web

    A group of renowned researchers has published some of the details of their exploitation of a vulnerability in the MD5 hash algorithm. The advance they describe would allow an attacker to create fraudulent Web-site certificates with which they could launch a phishing or man-in-the-middle attack on an eCommerce, eBanking or...

    Provided By Entrust