Software  >   Systems Software  >   Security Software  >  

Digital Certificates

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Public Key Certificates, Digi Cert, Digicert, Certificates, Digital IDs
DEFINITION: A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing  … 
Definition continues below.
Digital Certificates Multimedia (View All Report Types)
26 - 50 of 51 Matches Previous Page  |  Next Page
Podcast: Fault Tolerant Virtual Servers TCO Analysis
sponsored by NEC/INTEL
PODCAST: Tune in to this podcast to listen to Kevin Anthony Davis, Senior Systems Engineering Manager with NEC Corporation of America, discuss how combining software virtualization efficiency and hardware availability optimizes fault tolerance virtual servers and explore a fault tolerant virtual server TCO analysis.
Posted: 24 Jun 2016 | Premiered: May 25, 2016

NEC/INTEL

Podcast: Hardware-based Fault Tolerance Versus Software-based Fault Tolerance
sponsored by NEC/INTEL
PODCAST: Find out the differences between hardware- and software- based approaches to fault tolerance (FT) in this expert podcast. Discover a performance comparison of each approach as well as the differences between set up time, virtual machine capacity, network traffic issues, and more.
Posted: 23 Jun 2016 | Premiered: May 25, 2016

NEC/INTEL

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your Identity and Access Management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about Identity and Access Management (IAM) technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Take Control with Software Defined Networking
sponsored by Verizon
VIDEO: As technologies advance and become more heavily relied on, there is a need for increased bandwidth, performance and reliability. How do you keep up? Software-defined networking (SDN) is the answer to connection problems. Watch this video to learn about an SDN management solution that will grant you greater control over your network.
Posted: 06 May 2016 | Premiered: 07 Dec 2015

Verizon

TCO Analysis of Fault Tolerant Virtual Servers
sponsored by NEC/INTEL
WEBCAST: Kevin Anthony Davis, Senior Systems Engineering Manager with NEC Corporation of America, discusses how combining software virtualization efficiency and hardware availability optimizes fault tolerance virtual servers. You'll also explore a fault tolerant virtual server cost analysis.
Posted: 24 Jun 2016 | Premiered: May 25, 2016

NEC/INTEL

The Journey to Software-Defined Everything
sponsored by SevOne
WEBCAST: This short video demonstrates how applications and services can be more effectively distributed over a software-defined network. Access now to see how SevOne and Cisco have come together to build an application-centric infrastructure.
Posted: 08 Mar 2016 | Premiered: Mar 8, 2016

SevOne

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Why You Should Care about Identity-as-a-Service (iDaaS): An Expert's Perspective
sponsored by Rackspace
WEBCAST: This webcast defines identity-as-a-service in the context of real-world applications, and identifies the key capabilities it can provide, including credential management, claims issuance and acceptance, assurance of compliance, personalization information maintenance, and more.
Posted: 04 May 2016 | Premiered: Dec 31, 2015

Rackspace

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance ā€“ without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Software Defined Infrastructure for HPC
sponsored by IBM
WEBCAST: Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.
Posted: 28 Apr 2015 | Premiered: Mar 9, 2015

IBM

Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

SV 2 min chalk ā€˜nā€™ Talk on HP Service Virtualization
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief webcast looks at how service virtualization can help software development every step of the way.
Posted: 04 Nov 2013 | Premiered: Nov 4, 2013

Hewlett-Packard Enterprise

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

The Survival Guide to the EBS R12 Upgrade Survival Guide
sponsored by Dell Software
WEBCAST: This webcastĀ  shows you how to effectively manage an upgrade to Oracle E-Business Suite R12.
Posted: 21 Sep 2011 | Premiered: Sep 21, 2011

Dell Software

Windows Azure Platform Security Essentials: Module 1 - Security Architecture
sponsored by Microsoft
WEBCAST: In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
Posted: 16 Dec 2010 | Premiered: Dec 16, 2010

Microsoft
26 - 50 of 51 Matches Previous Page    1 2 3    Next Page
 
DIGITAL CERTIFICATES DEFINITION (continued): … A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.
Digital Certificates definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement