Presentations

 

Case Study featuring Kanda Software

Implementation of RC3 web-application architecture using the StrongAuth KeyAppliance™ to achieve state-of-the-art security of sensitive data in the public cloud. (Read also, Trending at Kanda: Data and Application Security. StrongAuth and Security Innovation).

Published: Feb 25, 2014 | Kanda Software | Sunnyvale, CA


Regulatory Compliant Cloud Computing (RC3) on IBM developerWorks

A web-application architecture for Secure Cloud Computing

Published: July 25- July 26, 2012 | Black Hat 2012 Conference | Las Vegas, Nevada, USA


Secure Cloud Computing

A security solution that lets you take advantage of Public Clouds while proving compliance to regulations!

Published: Oct 2-6, 2011 | JavaOne 2011 Conference | San Francisco, California, USA


StrongAuth's Introduction to Secure Cloud Computing

A security solution that will reduce the scope of compliance audits, manage trillions of keys/objects and, is fully operational in 48 hours or less.

Published: February 14, 2011 | RSA 2011 Conference | San Francisco, California, USA


StrongKey - The industry's first open-source SKMS

A security solution that provides secure cloud computing.

Published: June 9, 2009 | NIST Cryptographic Key Management Workshop | Gaithersburg, Maryland, USA


OASIS Enterprise Key Management Infrastructure (EKMI)

A collection of technology, policies and procedures for managing the life-cycle of all cryptographic keys in the enterprise.

Published: September 23, 2008 | IEEE Key Management Summit 2008 | Baltimore, Maryland, USA


StrongKey

The industry's first open-source SKMS

Published: September 23, 2008 | IEEE Key Management Summit 2008 | Baltimore, Maryland, USA