Other our websites
Social media
Contact information

Second Floor, No 61, 17th Street, Fajr 1 Street, Farshi Moghadam Street, North Kargar Street, Amir Abad District, Tehran, Iran

Postal Code

1438837546

Email

info@pki.co.ir

Phone

+98-21-88220690

 

  • Smart Card or Token that is the question!

    Smart Card or Token that is the question!

    2017/43/08
    Download size: 49kb
    Grouping: PKI Co. Whitepapers

    “These are the last years the name of token will be heard in a place like this. The world has moved toward smart card”, I heard these words from the sales manager of one of the greatest PKI companies around the world, in an exhibition.

    Download

  • Info Security has reported "Pki is Essential For Medical Iot"

    Info Security has reported "Pki is Essential For Medical Iot"

    2017/02/12
    Download size: 16 KB
    Grouping: Other Papers

    There are thousands of medical devices in use today vulnerable to hacking. Hospitals, outpatient centers, healthcare practices and even patients in their homes use high-tech equipment every day to monitor care, improve patient outcomes, and save lives. However, these connected devices (and the data housed within them) are at risk for exploitation without proper authentication and encryption. https://www.infosecurity-magazine.com/news/pki-essential-for-medical-iot/

    Download

  • Interview with NASA’s CIO on “Security Factors and Modernizing IT”

    Interview with NASA’s CIO on “Security Factors and Modernizing IT”

    2017/41/11
    Download size: 1.88 MB
    Grouping: Other Papers

    In an interview with the 4th Government Modernization Conference experts, Renee Wynn (NASA’s CIO) addresses the immediate needs for current modernization services of IT by detailing five major points: • IT Strategic Plan • IT Challenges • IT Expert Talent • Allocation of IT budget • Overall Outlook of IT Modernization for the Next 2-5 Years

    Download

  • The Internet of Things Business Index 2017, a report by The Economist Intelligence Unit (EIU) about the Transformation of IOT in Motion

    The Internet of Things Business Index 2017, a report by The Economist Intelligence Unit (EIU) about the Transformation of IOT in Motion

    2017/38/11
    Download size: 2.10 MB
    Grouping: Other Papers

    In September 2016 The Economist Intelligence Unit (EIU) surveyed 825 senior business leaders, 412 of whom are C-level executives or board members. Respondents were drawn from around the world, with 30% based in Europe, 30% in North America, 30% in Asia-Pacific and the remaining 10% in Latin America, the Middle East and Africa...

    Download

  • Securing the Digital City, a report by The Economist Intelligence Unit (EIU) about the Cyber-threats and responses

    Securing the Digital City, a report by The Economist Intelligence Unit (EIU) about the Cyber-threats and responses

    2017/16/11
    Download size: 1.52 MB
    Grouping: Other Papers

    While the IT systems of critical infrastructure providers face the same level of risk from cyber-attacks as do other enterprises in the private and public sectors, a cyber-attack on critical infrastructure can have much broader and deeper consequences for society and the economy.…

    Download

  • Digitizing IT, a report by The Economist Intelligence Unit (EIU) about the IT Leadership for the Next Phase of Digital Transformation

    Digitizing IT, a report by The Economist Intelligence Unit (EIU) about the IT Leadership for the Next Phase of Digital Transformation

    2017/11/11
    Download size: 3.19 MB
    Grouping: Other Papers

    As digital technology becomes embedded in almost every aspect of doing business, IT is increasingly called upon to advise the C-suite on the feasibility of new approaches and to deliver new applications and services, while continuing to perform the day-to-day tasks that keep existing systems up and running...

    Download

  •  Trust is more important than security

    Trust is more important than security

    2016/31/14
    Download size: 20 KB
    Grouping: PKI Co. Whitepapers

    Security is not enough, management demands trust Shahin Norouzi, an MSc in IT security, the Chairman of the Board in Pendar Kooshk Imen Company that works in the security and trust in the digital world field; insists to define the concepts of security and trust with two separate definitions, which are necessary and sufficient conditions to define the security of an electronic system. From his point of view

    Download

  • Security Issues of the Digital Certificates within Public Key Infrastructures

    Security Issues of the Digital Certificates within Public Key Infrastructures

    2016/19/01
    Download size: 206 kb
    Grouping: Other Papers

    The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance,

    Download

  • Digital Signature Application in Electronic Government

    Digital Signature Application in Electronic Government

    2016/51/21
    Download size: 132kb
    Grouping: PKI Co. Whitepapers

    Abstract: in discussions related to electronic services including electronic government it is possible to say without the necessary security infrastructures in cyberspace it is not possible to render such services.

    Download

  • Smart Card or Token, That is the question!

    Smart Card or Token, That is the question!

    2016/19/12
    Download size: 48KB
    Grouping: PKI Co. Whitepapers

    “These are the last years the name of token will be heard in a place like this. The world has moved toward smart card”, I heard these words from the sales manager of one of the greatest PKI companies around the world, in an exhibition.

    Download

  • Practical Guide to TPM 2.0

    Practical Guide to TPM 2.0

    2015/35/20
    Download size: 3.8mb
    Grouping: Other Papers

    Technical specifications are typically poor user manuals, and TPM 2.0 is no exception. One reader of the specification claimed it was “security through incomprehensibility.

    Download

  • Essential Security Services

    Essential Security Services

    2015/44/28
    Download size: 152 kb
    Grouping: Other Papers

    To establish an electronic government, it is required to analyze the essential security infrastructures. Because without ....

    Download

  • Digital Signature Application in Electronic Government

    Digital Signature Application in Electronic Government

    2015/35/28
    Download size: 132 kb
    Grouping: Other Papers

    Abstract: in discussions related to electronic services including electronic government it is possible to say without the ....

    Download

  • trusted computing

    trusted computing

    2015/28/08
    Download size: 692 KB
    Grouping: Other Papers

    A computer with some kind of additional hardware, that serves to protect the system from malicious software or unintended .....

    Download

Our Customers