Tag Archives: Technology_Internet

Entrust at RSA: Advanced Authentication for CJIS Compliance

February 28, 2013 by Entrust, Inc.     No Comments
This entry is part 8 of 9 in the series Entrust at RSA Conference 2013

At Entrust Booth 1139 at RSA this week, Entrust authentication expert Mike Moir outlined cost-effective methods for implementing advanced authentication to ensure CJIS compliance.

What is a Certified Document and when should you use it?

August 1, 2012 by Bruce Morton     No Comments

I found this article on the Adobe Security Matters website, What is a Certified Document and when should you use it? For those who need to certify documents, you may find it interesting. As a quick summary, it states that here are two frequent use cases for Certified Documents: Publishing files and want the recipients [Read More...]