IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key Encryption Multimedia (View All Report Types)
101 - 125 of 590 Matches Previous Page  |  Next Page
Collaboration: Delivering a More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Compliance Does Not Equal Security: Risk-Based Plan for ePHI Protection
sponsored by HP Security Voltage
WEBCAST: View this in depth webcast to learn how to establish a security-based strategy for data protection and how you can meet and go beyond healthcare regulation requirements. Watch now to learn more.
Posted: 03 Apr 2015 | Premiered: Aug 20, 2014

HP Security Voltage

Crafting the Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: This paper provides step-by-step instructions on how to craft a clear and persuasive business case for advanced security.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye

CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Customer Video: Chiquita CIO
sponsored by Workday
WEBCAST: This video covers the solution Chiquita went with to solve some of their business problems and get relevant data on the value of every worker in the company.
Posted: 12 Mar 2015 | Premiered: Oct 19, 2014

Workday

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Data Centers at Your Door: Prefabricated Modules from Schneider Electric
sponsored by Schneider Electric
VIDEO: Prefabricated data centers allow you to do just this. Access this video to learn how prefabricated IT and hydronics modules from Schneider Electric allow you to deliver a flexible and efficient data center built specifically for your needs without any of the guesswork.
Posted: 31 Oct 2014 | Premiered: 12 Jun 2014

Schneider Electric

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett-Packard Company
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett-Packard Company

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Limited and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Limited and Intel ®

Converged Infrastructure Trend 3- Software-defined Data Centers
sponsored by Hewlett-Packard Limited and Intel ®
VIDEO: This brief on-demand webcast provides information about the software-defined data center, explaining what this converged infrastructure trend is and how it can benefit your organization. Also inside, learn about the role of software-defined networking (SDN).
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

Hewlett-Packard Limited and Intel ®

Coping with grassroots IT innovation
sponsored by AppSense
WEBCAST: Employees today are trying to create their own solutions to practical IT challenges they face on a day-to-day basis, which can present challenges to the IT department. Learn how your organization can harness the key elements of this user-driven IT innovation in a way that complements current infrastructure and practices.
Posted: 26 Jun 2012 | Premiered: Jun 20, 2012

AppSense

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Cost Effective Techniques for Designing the Data Warehouse
sponsored by Embarcadero Technologies, Inc.
WEBCAST: A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now.
Posted: 30 Nov 2010 | Premiered: Nov 30, 2010

Embarcadero Technologies, Inc.

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Credit Union of Colorado Customer Testimonial
sponsored by CommVault
WEBCAST: This webcast to examines the management solution they decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

CommVault

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Data Deduplication
sponsored by CDW Corporation
VIDEOCAST: This videocast from CDW Corporation will take a brief, yet comprehensive look at Data Deduplication and the distinct, operational advantages this type of storage system can have on your every day business activity when compared with traditional backup methods. View now to learn more.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

CDW Corporation

Data Deduplication FAQ Podcast
sponsored by Quantum Corporation
PODCAST: This expert Podcast, featuring Jerome Wendt, President and Lead Analyst of DCIG, Inc. puts an end to the confusion by offering insights to the most commonly asked questions he hears in the field today.
Posted: 19 Dec 2007 | Premiered: Aug 12, 2008

Quantum Corporation

Data Loss Prevention from the Inside Out
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization.
Posted: 08 Jul 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.
101 - 125 of 590 Matches Previous Page    3 4 5 6 7 8    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement