IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key EncryptionMultimedia (View All Report Types)
101 - 125 of 634 Matches Previous Page  | Next Page
Cloud Adoption: Hosting Sensitive Data in the Cloud
sponsored by Dell, Inc.
VIDEO: This video details some of the top concerns surrounding the cloud and covers what top cloud providers have done to sure up security.
Posted: 04 Jun 2014 | Premiered: 04 Jun 2014

Dell, Inc.

Cloud Adoption: Multi-Cloud Management Challenges
sponsored by Dell, Inc.
VIDEO: This valuable video details why a multi-cloud environment creates a more complex environment to manage.
Posted: 05 Jun 2014 | Premiered: 05 Jun 2014

Dell, Inc.

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

Collaboration Gives GE More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Credit Union of Colorado Customer Testimonial
sponsored by CommVault
WEBCAST: Access this webcast to find out which management solution the Credit Union of Colorado selected to achieve true information management strategy and ensure recoverability and compliance.
Posted: 14 Feb 2014 | Premiered: Feb 14, 2014

CommVault

Critical Information Protection
sponsored by Clearswift
WEBCAST: This webcasts takes a look at the biggest factors affecting information and data security today and explains how security officers can get a handle on these challenges using secure content management systems.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

Clearswift

CSC MyWorkStyle: The Next Generation Workforce
sponsored by CSC
WEBCAST: This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

CSC

Customer Spotlight: Deploying a Data Protection Program in Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 26 Nov 2014 | Premiered: Nov 5, 2014

Digital Guardian

Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett-Packard Company
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett-Packard Company

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Limited and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Limited and Intel ®

Converged Infrastructure Trend 3- Software-defined Data Centers
sponsored by Hewlett-Packard Limited and Intel ®
VIDEO: This brief on-demand webcast provides information about the software-defined data center, explaining what this converged infrastructure trend is and how it can benefit your organization. Also inside, learn about the role of software-defined networking (SDN).
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

Hewlett-Packard Limited and Intel ®

Coping with grassroots IT innovation
sponsored by AppSense
WEBCAST: Employees today are trying to create their own solutions to practical IT challenges they face on a day-to-day basis, which can present challenges to the IT department. Learn how your organization can harness the key elements of this user-driven IT innovation in a way that complements current infrastructure and practices.
Posted: 26 Jun 2012 | Premiered: Jun 20, 2012

AppSense

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Cost Effective Techniques for Designing the Data Warehouse
sponsored by Embarcadero Technologies, Inc.
WEBCAST: A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now.
Posted: 30 Nov 2010 | Premiered: Nov 30, 2010

Embarcadero Technologies, Inc.

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
101 - 125 of 634 Matches Previous Page    3 4 5 6 7 8    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement