У нас вы можете посмотреть бесплатно PKI deployments are as unique as any snowflake; how to build equally flexible PQ migration strategie или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
After TCP/IP, X.509 is probably the most widely deployed technology in modern networking. Use cases of X.509 from the incredibly mainstream to the incredibly niche are as diverse as the Internet itself. This talk will classify different types of PKI deployments according to the types of challenges that they will face during PQ transition including discoverability of the crypto in use (cryptographic bill of materials CBOM), hardware lock-in, which, depending where it is in your network, leads to different types of migration challenges, and the security properties needing during the migration. We will then survey a suite of crypto discovery and transition tools discussing which migration types and security properties they address. Greg Wetmore - Vice President Product Development at Entrust