![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/all/themes/custom_front/images/you_are_here_red.gif)
![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/default/files/beta-site.gif)
|
Demystifying PKI: Enterprise Environments - Part 4
by Michele (Mike) Hjörleifsson
Sep, 2009 Issue
Article Synopsis
Last month we discussed the deployment of an enterprise class Certificate Authority and how to protect your keys. This month we are going to put our PKI knowledge to practical use. Since you spent the time deploying a CA it's worth looking at what PKI can be used for. There are a myriad of security and assurance implementations that use PKI today, most of which work so well we barely give them any thought. It is worth a quick review to ensure you get the most out of your PKI infrastructure.
This article was published in the 25.09 issue of MacTech Magazine. Subscribers saw this article in the print magazine when it was first published. MacTech provides its readers with valuable information each and every month, but even if it only solves one problem for you a year, it's more than paid for itself.
Subscribe today with a special RISK FREE trial subscription ... and get the back issues at the MacTech Store, or the new MacTech CD with the history of the magazine all in one convenient place.
![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/all/themes/custom_front/img/search_text.gif)
- SPREAD THE WORD:
- Slashdot
- Digg
- Del.icio.us
- Newsvine