IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Digital Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Signatures
DEFINITION: A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message. For example, Phil Zimmermann's popular encryption program, Pretty Good Privacy, requires a passphrase  … 
Definition continues below.
Digital Signatures Multimedia (View All Report Types)
151 - 175 of 495 Matches Previous Page  |  Next Page
Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Gaining Cloud Efficiencies for Northern Ireland
sponsored by Hewlett-Packard Enterprise
VIDEO: In this video case study, explore how the public sector in Northern Ireland was able to meet the growing complexity of computing needs by partnering with HPE Helion. Inside, see how they are now able to effectively scale their computing power needs, enable efficient data access to everyone, and save big on infrastructure costs.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

From Batch Processing to Workload Automation
sponsored by BMC Software, Inc.
PODCAST: Download this podcast to find out how IT workload automation can help you improve the efficiency of your overall operations and help your business deliver new applications more quickly.
Posted: 26 Jan 2010 | Premiered: Jan 26, 2010

BMC Software, Inc.

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Gain Instant Protection with Powerful VM Backup Software
sponsored by Commvault
WEBCAST: If you're looking to backup your virtualised datacentre and VMs, check out this webcast from CommVault, and learn how one of the leading dental service organizations in the US found a way to backup and manage their more than 400 virtual machines by choosing the right backup software.
Posted: 08 May 2014 | Premiered: Sep 3, 2013

Commvault

Gaining a Key Competitive Edge in the MSP Marketplace
sponsored by Autotask Corporation
VIDEO: This brief video describes a product that will bring accountability to your organization.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation

Gartner Magic Quadrant for Application Delivery Controllers
sponsored by Citrix
WEBCAST: Discover why Citrix is in the leader's quadrant for the 8th consecutive year of the Gartner Magic Quadrant for ADCs.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

TOPICS:  IT Management
Citrix

Gartner Magic Quadrant for Enterprise File Sync-and-Share
sponsored by Citrix
WEBCAST: The EFSS market is growing fast and adding new capabilities. Learn how the options stack up in Gartner's 2015 rankings.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

TOPICS:  IT Management
Citrix

Gartner: Midsize Enterprises Should Embrace Hyperconvergence
sponsored by SimpliVity
WEBCAST: Midmarket I&O teams face constant pressure to simplify data centers. Find out why Gartner recommends hyperconvergence.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

TOPICS:  IT Management
SimpliVity

Get a Hybrid Cloud Storage Demo
sponsored by Microsoft
WEBCAST: Interested in StorSimple and Microsoft Azure? Request a demo.
Posted: 14 Dec 2015 | Premiered: Dec 14, 2015

TOPICS:  IT Management
Microsoft

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

GFI MAX Building Blocks & MSP University Podcast
sponsored by GFI Software
PODCAST: This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.
Posted: 10 Dec 2010 | Premiered: Dec 10, 2010

GFI Software

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Going Crazy Without File Type Association?
sponsored by Dell
VIDEO: File type association is essential. Watch how it can help your employees save time—and maybe even their sanity.
Posted: 28 Jan 2015 | Premiered: 28 Jan 2015

TOPICS:  IT Management
Dell

Guided Analytics-Transferring Best Practice Analytics from Experts to Everyone
sponsored by TIBCO Spotfire Division
WEBCAST: View this webcast to learn systematic techniques for quickly capturing an analysis workflow and distributing it throughout an organization to users of all skill levels.
Posted: 11 Feb 2008 | Premiered: Feb 13, 2008

TIBCO Spotfire Division

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com
151 - 175 of 495 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DIGITAL SIGNATURES DEFINITION (continued): … A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message. For example, Phil Zimmermann's popular encryption program, Pretty Good Privacy, requires a passphrase when you sign or decrypt a message. Passphrases are often up to 100 characters in length.
Digital Signatures definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement