IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key EncryptionIT Downloads (View All Report Types)
1 - 25 of 73 Matches Previous Page  | Next Page
Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Free Trial – Innotas Project Portfolio Management in the Cloud
sponsored by Innotas
TRIAL SOFTWARE: This free trial of Innotas' Project Portfolio Management cloud solution will give you a taste of what it feels like to streamline the management of strategic initiatives within your enterprise. Download this free trial now to start delivering IT projects on time and within budget, and to achieve the desirable ROI on your projects.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Innotas

HEAT Service Management Trial
sponsored by FrontRange Solutions Inc.
SOFTWARE DEMO: Click on the link to gain access to a software demo from FrontRange.
Posted: 17 Jul 2014 | Premiered: 17 Jul 2014

FrontRange Solutions Inc.

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

Acronis vmProtect 6
sponsored by Acronis
TRIAL SOFTWARE: Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Posted: 14 Dec 2011 | Premiered: 14 Dec 2011

Acronis

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

ActivEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try.
Posted: 17 Oct 2013 | Premiered: 17 Oct 2013

Acronis

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

BlackBerry® Client for IBM® Lotus® Connections or BlackBerry® Client for IBM® Lotus® Quickr™
sponsored by BlackBerry
SOFTWARE DEMO: Help mobile workers access the information and expertise needed to remain productive while on the go. 
Posted: 12 May 2010 | Premiered: 12 May 2010

BlackBerry

CA ARCserve Replication r15 and CA ARCserve High Availability r15 Evaluation Software
sponsored by arcserve
SOFTWARE DOWNLOAD: CA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now.
Posted: 28 Jun 2010 | Premiered: 28 Jun 2010

arcserve

CA ARCserve® D2D Evaluation Software
sponsored by arcserve
SOFTWARE DOWNLOAD: CA ARCserve D2D is a new disk-based backup product designed to provide the perfect combination of fast, simple and reliable protection and recovery for all of your business information. Download now to see for yourself.
Posted: 28 Jun 2010 | Premiered: 28 Jun 2010

arcserve

CA Clarity Project and Portfolio Management
sponsored by CA Technologies.
PRODUCT DEMO: Watch this in-depth product demo to learn how CA Clarity works. This project and portfolio management solution enables users to view all projects, programs, services, assets, and applications in a collection of portfolios.
Posted: 31 Mar 2010 | Premiered: 30 Mar 2010

CA Technologies.

CA eHealth Performance Manager Demo
sponsored by CA Technologies.
PRODUCT DEMO: Download this demo to learn how you can proactively monitor performance of data and voice networks, physical and virtual systems, environmentals, databases and client/server applications across IT, all from one interface, before your business is negatively impacted.
Posted: 23 Nov 2009 | Premiered: 23 Oct 2009

CA Technologies.

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Data Systems

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

HP GlancePlus
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: Keep business applications running smoothly and efficiently. HP GlancePlus software arms your organization with powerful system performance monitoring and diagnostic capabilities. It enables you to easily examine system activities, identify and resolve performance bottlenecks, and tune your system for more efficient operation.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Hewlett-Packard Company

HP Network Automation 9.00 Evaluation
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett-Packard Company
1 - 25 of 73 Matches Previous Page    1 2 3    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement