Presentations

Case Study Featuring Kanda Software

Regulatory Compliant Cloud Computing (RC3) on IBM developerWorks

  • A web application architecture for Secure Cloud Computing
    Published: July 25–26, 2012 | Black Hat 2012 Conference | Las Vegas, Nevada, USA

Secure Cloud Computing

  • A security solution that lets you take advantage of Public Clouds while proving compliance to regulations!
    Published: Oct 2–6, 2011 | JavaOne 2011 Conference | San Francisco, California, USA

StrongAuth’s Introduction to Secure Cloud Computing

  • A security solution that will reduce the scope of compliance audits, manage trillions of keys/objects, and which is fully operational in 48 hours or less.
     —
    Published: February 14, 2011 | RSA 2011 Conference | San Francisco, California, USA

StrongKeyThe Industry’s First Open-Source SKMS

  • A security solution that provides secure cloud computing.
     —
    Published: June 9, 2009 | NIST Cryptographic Key Management Workshop | Gaithersburg, Maryland, USA

OASIS Enterprise Key Management Infrastructure (EKMI)

  • A collection of technology, policies and procedures for managing the lifecycle of all cryptographic keys in the enterprise.
     —
    Published: September 23, 2008 | IEEE Key Management Summit 2008 | Baltimore, Maryland, USA

StrongKey

  • The industry’s first open-source SKMS
     —
    Published: September 23, 2008 | IEEE Key Management Summit 2008 | Baltimore, Maryland, USA

Successful PKI implementations

  • Contrary to what you might have heard or read in the Information Technology (IT) press, companies have built Public Key Infrastructures (PKI) successfully, and use them daily to solve day-to-day business problems. What is little known, however, is the magic potion these companies used to make their PKIs successful. This paper will attempt to demystify some of that magic and provide you guidance that can help you navigate the pitfalls as you deploy your PKI.
    Published in the ISSA Journal, September 2005