IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Digital Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: A digital signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically  … 
Definition continues below.
Digital Signatures Multimedia (View All Report Types)
151 - 175 of 433 Matches Previous Page  |  Next Page
How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

How to Benefit from Analyzing Virtualization Performance
sponsored by SearchServerVirtualization
VIRTUAL ENVIRONMENT: Getting insight into server and VM performance is essential for IT at any organization. Culling the right data is a challenge, however, so this classroom will examine the best ways to sift through performance reports and apply this knowledge to increase efficiency and ROI.
Posted: 28 Jul 2014 | Premiered: 29 Jul 2014

SearchServerVirtualization

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

How to Speed Up Detection of Advanced Attacks
sponsored by Threat Track Security
WEBCAST: This webcast provides guidelines for catching and stopping threats before they have time to do damage.
Posted: 16 Feb 2015 | Premiered: Dec 3, 2014

Threat Track Security

How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

HP helps United Airlines consolidate their IT infrastructure
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video case study examines how United Airlines was able to consolidate its IT infrastructure and fuel customer experience success with the right service. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

HP Security Solutions
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

How to Make Virtual Desktop Security Simpler and More Scalable
sponsored by Citrix
WEBCAST: It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users.
Posted: 26 Apr 2011 | Premiered: Apr 25, 2011

Citrix

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

How You Can Leverage CA 3Tera AppLogic
sponsored by CA Technologies.
VIDEO: Watch this video and learn how you can leverage CA 3Tera AppLogic to roll out new business applications and services faster than you thought was possible. Bring the power of the cloud to your company.
Posted: 22 Mar 2011 | Premiered: 22 Mar 2011

CA Technologies.

HP Business Service Management
sponsored by Hewlett-Packard Company
WEBCAST: HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business.
Posted: 04 Feb 2011 | Premiered: Feb 4, 2011

Hewlett-Packard Company

HP GlancePlus
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: Keep business applications running smoothly and efficiently. HP GlancePlus software arms your organization with powerful system performance monitoring and diagnostic capabilities. It enables you to easily examine system activities, identify and resolve performance bottlenecks, and tune your system for more efficient operation.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Hewlett-Packard Company

HP Mobile Application Security
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett-Packard Company

HP Network Automation 9.00 Evaluation
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett-Packard Company

Hybrid IT Service Management
sponsored by FrontRange Solutions Inc.
VIDEO: This brief, two minute video will teach you about a single-platform IT service management (ITSM) solution that provides flexible deployment options, reduces IT costs, improves service delivery, and more.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

IBM Advances Research Through Cloud Computing to Help Solve Real-World Problems
sponsored by IBM
VIDEO: Watch this video to see how IBM is helping research organizations take advantage of cloud computing solutions to help these groups do more with less.
Posted: 22 Sep 2010 | Premiered: 22 Sep 2010

IBM

IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014

IBM

IBM Cognos Online Conference for Retailers and Manufactures
sponsored by IBM
VIRTUAL SEMINAR: This 2-hour complimentary virtual seminar on performance management (PM) takes place on October 21 and continues on November 4th — Join us to learn how PM can help you improve visibility into your manufacturing business so you can reduce costs, speed delivery and efficiency, satisfy customers and create innovative new products.
Posted: 24 Sep 2009 | Premiered: 21 Oct 2009

IBM

IBM developerWorks tech talk series for cloud computing - Live technical sessions with cloud experts
sponsored by IBM
WEBCAST: Cloud computing is all the buzz in the IT world and as you begin planning your cloud adoption strategy, you must be sure that you leverage the right technologies to smooth the transition. Check out this webcast to review key insights on how to optimize your cloud computing projects.
Posted: 30 Apr 2012 | Premiered: May 1, 2012

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM
151 - 175 of 433 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DIGITAL SIGNATURES DEFINITION (continued): …  time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.How It WorksAssume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer … 
Digital Signatures definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement