Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Certification Authorities

  In days of old, introductions were made by means of credentials, issued by a trusted party. In some cases, such credentials were accepted more or less at a global level. A good example of this is the ordinary passport, supported, if necessary, by additional documentation, such as a visa. In this case, the trusted issuer of the credential is …

Whitepaper Posted by: dymar on 06/03/2018 10:26

SOPHOS – Protection for Mac and Linux computers

The current risk to computers running non-Windows platforms is small but growing. As Mac and Linux computers become more prevalent within organizations, they are likely to become more of a target for hackers as a way in to the rest of the network and a means of infecting websites. This paper investigates the real threat from non-Windows platforms. It discusses …

Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Advanced Authentication

  Advanced Authentication is a key component of any Enterprise or Internet Security system, together with Authorisation, Administration, Encryption, Intrusion Detection, Antivirus, Content Management and Firewalls. At its simplest level authentication is a way of identifying the user of a system or the sender of a message. The authentication determines that the user is who they claim to be and …

Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Homeland Defense Information

Information systems have evolved over the last two decades to a point where both commercial and government organizations have become heavily dependent on their uninterrupted operation to sustain day-to-day business. Within the United States, the recognition that these systems were vulnerable and needed protection first began to be addressed in 1996 as part of the initial study conducted by the …

Page 3 of 41234