RSA SECURITY DEBUTS ENCRYPTION SOFTWARE FOR JAVA APPLICATIONS.
Raising the bar for Java SSL (Secure Sockets Layer) The leading security protocol on the Internet. Developed by Netscape, SSL is widely used to do two things: to validate the identity of a Web site and to create an encrypted connection for sending credit card and other personal data. technology, RSA Security Inc. (Nasdaq: RSAS RSAS RSA Security, Inc. (stock abbreviation, AMEX)
RSAS Royal Swedish Academy of Sciences
RSAS RAND Strategy Assessment System
RSAS Reactor Safety Assessment System ), Bedford, Mass., has introduced a new version of RSA (1) (Rural Service Area) See MSA.
(2) (Rivest-Shamir-Adleman) A highly secure cryptography method by RSA Security, Inc., Bedford, MA (www.rsa.com), a division of EMC Corporation since 2006. It uses a two-part key. BSAFE SSL-J, the latest release of RSA Security's Java- based Secure Socket Layer (SSL) and Transport Layer Security (TLS (1) (Transport Layer Security) A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape. TLS uses digital certificates to authenticate the user as well as authenticate the network (in a wireless ) security software offering trusted RSA Security encryption. This industry-leading encryption software is designed to provide transaction privacy, data integrity and authentication, and to offer everything needed to meet Java developers' security protocol requirements.
"Today's announcement reflects the evolving needs of our customers, and reinforces RSA Security's commitment to providing Java developers with all of the tools they need to quickly and easily add security to their applications," said Scott Schnell, senior vice president of marketing at RSA Security. "Building on earlier versions of RSA BSAFE SSL-J, the latest release is one of the industry's most comprehensive packaged security component solutions on the market today, and is ideal for enterprises working in the Java environment."
The new RSA BSAFE SSL-J 3.1 software incorporates a number of important new features and benefits for the Java developer community:
-- RSA BSAFE(R) SSL-J software supports version 2 of the Secure Socket Layer (SSL) protocol, in addition to the product's existing support for SSL version 3 and TLS version. As a result, enterprises can benefit from RSA Security's leading encryption technology, while maintaining maximum interoperability.
-- RSA BSAFE software is designed to allow developers to create a complete SSL version 3 client with only 150K of code. This means that full-strength security can be easily included in applets, embedded applications and other environments where download size is critical.
-- RSA BSAFE SSL-J 3.1 software is designed to enable developers to select their own SSL parameters, such as cipher cipher: see cryptography.
(1) The core algorithm used to encrypt data. A cipher transforms regular data (plaintext) into a coded set of data (ciphertext) that is not reversible without a key. suites, SSL versions and compression methods. This provides companies with greater development control, which, in turn, can lead to a reduction in development time and a shortened time to market.
-- RSA BSAFE SSL-J software is designed to integrate easily with RSA BSAFE Cert-J to make certificate revocation list In the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates (more accurately: their serial numbers) which have been revoked, are no longer valid, and should not be relied on by any system user. (CRL CRL - Carnegie Representation Language.
Carnegie Group, Inc. Frame language derived from SRL. Written in Common LISP. Used in the product Knowledge Craft. ) support, and other higher-level certificate functionality, easier to administer and support.
Transport Layer Security
The Transport Layer Security (TLS) protocol is an improved and standardized version of Secure Sockets Layer (networking, security) Secure Sockets Layer - (SSL) A protocol designed by Netscape Communications Corporation to provide secure communications over the Internet using asymmetric key encryption. (SSL), the de facto [Latin, In fact.] In fact, in deed, actually.
This phrase is used to characterize an officer, a government, a past action, or a state of affairs that must be accepted for all practical purposes, but is illegal or illegitimate. Internet protocol for session-based encryption and authentication. As defined by the IETF See Internet Engineering Task Force.
IETF - Internet Engineering Task Force , TLS is a general-purpose protocol for providing a secure communications channel between two parties with server and client authentication, application interoperability, improved performance and an extensible framework for incorporating new encryption and authentication technologies as needed.
TLS is currently supported by major Web browsers and servers and is used by many industry-leading software and hardware companies to incorporate secure communications within their applications. Users of TLS include business, government and services development organizations and independent software vendors (ISVs) for creating a wide variety of applications requiring communications security, including electronic commerce and financial transactions, electronic data interchange See EDI.
(application, communications) electronic data interchange - (EDI) The exchange of standardised document forms between computer systems for business use. EDI is part of electronic commerce. , LDAP (Lightweight Directory Access Protocol) A protocol used to access a directory listing. LDAP support is implemented in Web browsers and e-mail programs, which can query an LDAP-compliant directory. directory services, database connectivity, groupware and collaborative applications, terminal emulation and many others.
Runtime licenses for products and support using RSA BSAFE SSL-J 3.1 are available now on a royalty, per-seat or annual fee basis.
About RSA Security Inc.
RSA Security Inc., The Most Trusted Name in e-Security(TM), helps organizations build secure, trusted foundations for e-business through its RSA SecurID(R) two-factor authentication, RSA BSAFE(R) encryption and RSA Keon(R) digital certificate management systems. With more than a half billion RSA BSAFE-enabled applications in use worldwide, more than six million RSA SecurID users and almost 20 years of industry experience, RSA Security has the proven leadership and innovative technology to address the changing security needs of e-business and bring trust to the new, online economy.
For more information, visit www.rsasecurity.com or call 781-301-5344.