IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.
Public Key Encryption Multimedia (View All Report Types)
126 - 150 of 756 Matches Previous Page  |  Next Page
Case Study: UberGlobal
sponsored by Commvault
VIDEO: Access this webcast to discover how UberGlobal implemented a scalable cloud storage platform with data deduplication capabilities that allowed them to overcome their data management challenges. Watch to see how this storage solution can provide your enterprise with cost and efficiency improvements.
Posted: 03 Dec 2015 | Premiered: 02 Nov 2015

Commvault

City of LA Maximizes Performance, Cost, and Flexibility with Hyper-Converged Systems
sponsored by NTT ICT
VIDEO: In the following video case study, see how with successful deployment of HPE's hyper-converged systems, the Department of Building and Safety for the city of Los Angeles was able drastically reduce component failure due to overheating; reduce operation costs; and improve on and off-premise data center performance.
Posted: 09 Sep 2016 | Premiered: 21 Dec 2015

NTT ICT

Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016

IBM

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Enterprise

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Chalk Talk Video: How Zero Branch IT Keeps Your Safe
sponsored by Riverbed Technology, Inc.
VIDEO: Branch locations hold 50% of all valuable data. Learn to protect them without on-premises servers, storage or backup.
Posted: 02 Dec 2015 | Premiered: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Channel Success Stories: The SMB Market Case Study: KIS
sponsored by Dell PartnerDirect and Intel
PODCAST: This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market.
Posted: 15 Dec 2008 | Premiered: Dec 15, 2008, 09:00 EST (14:00 GMT)

Dell PartnerDirect and Intel

Chas Dye the Database Guy on Performance
sponsored by Pure Storage
VIDEO: Free yourself from the shackles of physical I/O. Find out how flash enables better performance and simple management.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

Chas Dye the Database Guy on Resiliency
sponsored by Pure Storage
VIDEO: Databases on traditional SAN often face performance degradation and outages. Learn how new databases enable 100% uptime.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service
sponsored by Citrix Ready and Caringo
WEBCAST: In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.
Posted: 30 Aug 2013 | Premiered: Sep 12, 2013


Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
126 - 150 of 756 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement