Software  >   Systems Software  >   Security Software  >  

Digital Certificates

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Public Key Certificates, Digi Cert, Digicert, Certificates, Digital IDs
DEFINITION: A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. The document consists of a specially formatted block of data that contains the name of the certificate holder (which may be either a user or a system name) and the holder's public key, as well as the digital signature of a certification authority for authentication. The certification  … 
Definition continues below.
Digital Certificates Multimedia (View All Report Types)
76 - 90 of 90 Matches Previous Page  |  Next Page
Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Streamline Software Asset Management, Compose a software Management Symphony
sponsored by CDW Corporation
WEBCAST: View this webcast to explore a software asset management solution with customized application inventory reporting that enables you to easily assess software licenses and reduce compliance risks and costs.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

CDW Corporation

Taking a More Strategic Approach to Software Management
sponsored by CDW Corporation
VIDEO: This video explores how you can work with CDW to figure out what's in your software environment and what type of licenses you have in order to help you build a more strategic approach to your software. View now to learn how you can deliver more benefits from your future agreements.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

CDW Corporation

The Right Partner to Handle Software Licensing Challenges
sponsored by CDW Corporation
VIDEO: This video explores how one growing financial institution was able to overcome their software licensing challenges by partnering with the professionals at CDW who helped them through every step of the process.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

CDW Corporation

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Want to see JRebel in action? Download your free trial now!
sponsored by ZeroTurnaround
TRIAL SOFTWARE: JRebel is a developer productivity tool that allows Java developers to view code changes instantly. It eliminates the rebuild, restart, redeploy cycle inherent in Java development, which enables developers to get more done in the same amount of time. See for yourself how developers increase team velocity up to 40%!
Posted: 15 Oct 2014 | Premiered: 15 Oct 2014

ZeroTurnaround

What's your Vision for the Future?
sponsored by CA Technologies.
VIDEO: Access this video to get a sense of what's ahead and find out how CA software and the mainframe will make ideas for the future into realities. You'll get insight into how this software and the mainframe will play a role in tomorrow's autonomous cars, applications for healthcare, and home automation.
Posted: 04 Nov 2014 | Premiered: 04 Nov 2014

CA Technologies.

SV 2 min chalk ‘n’ Talk on HP Service Virtualization
sponsored by Hewlett-Packard Limited
WEBCAST: This brief webcast looks at how service virtualization can help software development every step of the way.
Posted: 04 Nov 2013 | Premiered: Nov 4, 2013

Hewlett-Packard Limited

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

The Survival Guide to the EBS R12 Upgrade Survival Guide
sponsored by Dell Software
WEBCAST: This webcast  shows you how to effectively manage an upgrade to Oracle E-Business Suite R12.
Posted: 21 Sep 2011 | Premiered: Sep 21, 2011

Dell Software

Transforming Big Data into Insights with IBM System z: An Independent Consultant’s Perspective
sponsored by IBM
WEBCAST: Join us as Mike Ferguson, an independent consultant and analyst, reviews business and technical requirements for organizations embarking on big data and business analytics solutions. He will also discuss key IBM solutions for System z.
Posted: 22 Apr 2014 | Premiered: Jun 24, 2014

IBM

Windows Azure Platform Security Essentials: Module 1 - Security Architecture
sponsored by Microsoft
WEBCAST: In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
Posted: 16 Dec 2010 | Premiered: Dec 16, 2010

Microsoft
76 - 90 of 90 Matches Previous Page    2 3 4    Next Page
 
DIGITAL CERTIFICATES DEFINITION (continued): …  authority attests that the sender's name is the one associated with the public key in the document. A user ID packet, containing the sender's unique identifier, is sent after the certificate packet. There are different types of public key certificates for different functions, such as authorization for a specific action or delegation of authority. Public key certificates are part of a public key infrastructure that deals with digitally signed documents. The other components are public key encryption, trusted third parties (such as the certification authority), and mechanisms for certificate publication … 
Digital Certificates definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement