Software  >   Systems Software  >   Security Software  >  

Digital Certificates

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Public Key Certificates, Digi Cert, Digicert, Certificates, Digital IDs
DEFINITION: A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. The document consists of a specially formatted block of data that contains the name of the certificate holder (which may be either a user or a system name) and the holder's public key, as well as the digital signature of a certification authority for authentication. The certification  … 
Definition continues below.
Digital Certificates Multimedia (View All Report Types)
76 - 100 of 101 Matches Previous Page  |  Next Page
Simplify Financial Transactions
sponsored by Workday
WEBCAST: Watch this brief webcast now for a demo of data visibility financial software, and uncover its key features.
Posted: 24 Apr 2014 | Premiered: Dec 2, 2013

Workday

Strategies to Ensure Software Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.
Posted: 27 Feb 2015 | Premiered: Nov 7, 2014

Veracode, Inc.

Take Control of Your Applications With SDN
sponsored by Citrix
VIDEO: Learn more about Software Defined Networks and how NetScaler provides orchestration and management to your applications.
Posted: 25 Mar 2015 | Premiered: 28 Jan 2014

Citrix

The Best and Worst Antivirus Platforms Compared
sponsored by Check Point Software Technologies Ltd.
WEBCAST: In this webcast, watch as top anti-malware platforms go head to head and see who has the best catch rates of known and unknown attacks and who lets the most slip through the cracks. View now to learn more.
Posted: 03 Mar 2015 | Premiered: Aug 25, 2014

Check Point Software Technologies Ltd.

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

The Processes of an Application Security Program
sponsored by Veracode, Inc.
WEBCAST: In this video, you can view a demo of how one application security program works.
Posted: 20 Mar 2015 | Premiered: Mar 4, 2014

Veracode, Inc.

The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST: In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014

Veracode, Inc.

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Virtualization Workloads
sponsored by Dell, Inc.
VIDEO: Watch this brief video to learn how a portfolio of next-generation servers can deliver the performance, scalability, and reliability your virtualized environments need to truly excel.
Posted: 06 Feb 2015 | Premiered: 07 Sep 2014

Dell, Inc.

Visualization: How it all comes together
sponsored by GE
WEBCAST: Healthcare is evolving and becoming more patient-centric. Tools and software are being released to provide better visibility to data once stored in silos. Today, healthcare workers need a single workstation that provides access to advanced processing tools. Access this webcast for an introduction to an imaging application.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

GE

Want to see JRebel in action? Download your free trial now!
sponsored by ZeroTurnaround
TRIAL SOFTWARE: JRebel is a developer productivity tool that allows Java developers to view code changes instantly. It eliminates the rebuild, restart, redeploy cycle inherent in Java development, which enables developers to get more done in the same amount of time. See for yourself how developers increase team velocity up to 40%!
Posted: 15 Oct 2014 | Premiered: 15 Oct 2014

ZeroTurnaround

What's your Vision for the Future?
sponsored by CA Technologies.
VIDEO: Access this video to get a sense of what's ahead and find out how CA software and the mainframe will make ideas for the future into realities. You'll get insight into how this software and the mainframe will play a role in tomorrow's autonomous cars, applications for healthcare, and home automation.
Posted: 04 Nov 2014 | Premiered: 04 Nov 2014

CA Technologies.

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos, Inc.

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

SQL Diagnostic Manager – Download a Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover all the ins-and-outs of a 24/7 SQL performance monitoring, alerting and diagnostic tool – and gain access to a free trial.
Posted: 21 Jul 2014 | Premiered: 21 Jul 2014

Idera

Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

Storage Response Time Monitor
sponsored by SolarWinds, Inc.
SOFTWARE DOWNLOAD: Having trouble with storage latency issues? SolarWinds® Storage Response Time Monitor free tool tracks those sluggish VMs, shows the top host to datastore total response times and a count of additional high latency offenders.
Posted: 03 Aug 2012 | Premiered: 03 Aug 2012

SolarWinds, Inc.

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

SV 2 min chalk ‘n’ Talk on HP Service Virtualization
sponsored by Hewlett-Packard Limited
WEBCAST: This brief webcast looks at how service virtualization can help software development every step of the way.
Posted: 04 Nov 2013 | Premiered: Nov 4, 2013

Hewlett-Packard Limited

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

The Survival Guide to the EBS R12 Upgrade Survival Guide
sponsored by Dell Software
WEBCAST: This webcast  shows you how to effectively manage an upgrade to Oracle E-Business Suite R12.
Posted: 21 Sep 2011 | Premiered: Sep 21, 2011

Dell Software

Windows Azure Platform Security Essentials: Module 1 - Security Architecture
sponsored by Microsoft
WEBCAST: In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
Posted: 16 Dec 2010 | Premiered: Dec 16, 2010

Microsoft
76 - 100 of 101 Matches Previous Page    2 3 4 5    Next Page
 
DIGITAL CERTIFICATES DEFINITION (continued): …  authority attests that the sender's name is the one associated with the public key in the document. A user ID packet, containing the sender's unique identifier, is sent after the certificate packet. There are different types of public key certificates for different functions, such as authorization for a specific action or delegation of authority. Public key certificates are part of a public key infrastructure that deals with digitally signed documents. The other components are public key encryption, trusted third parties (such as the certification authority), and mechanisms for certificate publication … 
Digital Certificates definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement