IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key EncryptionMultimedia (View All Report Types)
126 - 150 of 577 Matches Previous Page  | Next Page
Dell AppAssure 5 Trial Download
sponsored by Dell Software
TRIAL SOFTWARE: Check out this free trial download of one vendor's data backup software that has revolutionized data protection by unifying backup, replication and recovery all in one solution. Download your free trial now.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Dell Software

Dell ProSupport Plus: Going to the Ends of the Earth
sponsored by Dell, Inc. and Intel®
WEBCAST: In this brief video, explore how Dell ProSupport Plus goes above and beyond the traditional expectations of customer service with round-the-clock support and proactive monitoring, as well as preventative recommendations.
Posted: 13 Jun 2013 | Premiered: Apr 23, 2013

Dell, Inc. and Intel®

Demo: Learn How Hardware Snapshots Work
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Check out this informative demo to find out how snapshot technology works, and how it can improve your business performance.
Posted: 11 Feb 2014 | Premiered: 07 Jan 2013

CommVault Systems, Inc.

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: View this webcast to find out how you can create effective application security in the enterprise. Learn more about eliminating some of the most prevalent threats to your businesses by tuning in to this video now.
Posted: 11 Mar 2013 | Premiered: Mar 11, 2013

IBM

Driving Innovation to Improve the Customer Experience
sponsored by Hewlett-Packard Company
WEBCAST: This webcast breaks down 5 levels of innovation that can help your business form a better relationship with customers through this new style of IT. Watch to find out how to spark innovation among your IT team and leverage technology to help it along.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Hewlett-Packard Company

EDM's Digital Mailroom Gets a Makeover
sponsored by Perceptive Software
VIDEO: Find out which industry-leading product helped an information management services provider gain a competitive edge over their peers, and solve the unique automation challenges of the digital mailroom.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

Perceptive Software

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Dell Compellent for Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WEBCAST: Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.
Posted: 27 Apr 2012 | Premiered: Apr 18, 2012, 01:00 EDT (05:00 GMT)

Dell, Inc.

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST: This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009

Dell Software

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST: Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

Disk Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WEBCAST: This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

ExaGrid Systems, Inc.

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Limited
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Limited

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.
126 - 150 of 577 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement