IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key EncryptionMultimedia (View All Report Types)
126 - 150 of 527 Matches Previous Page  | Next Page
Document Workflow Automation and Secure Archiving
sponsored by Symtrax Corporation
WEBCAST: Join this free 45 minute live demo to learn about a solution for creating and managing automated document workflows. See how you can gain peace of mind with a secure and easily searchable archive that allows users to view, print, or email documents through one single Internet browser.
Posted: 04 Dec 2013 | Premiered: Dec 4, 2013

Symtrax Corporation

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It
sponsored by Lumension
WEBCAST: This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now.
Posted: 15 Feb 2013 | Premiered: Feb 15, 2013

Lumension

Download PHD Virtual Backup for Citrix, Free for 15 days
sponsored by PHD Virtual
SOFTWARE DOWNLOAD: This free trial software download provides 15 days of use for PHD Virtual Backup for Citrix XenServer. This This solution provides fast performance and effortless scalability without the need for extra hardware or software.
Posted: 21 Apr 2014 | Premiered: 21 Apr 2014

PHD Virtual

Download PHD Virtual Backup for Hyper-V, Free for 15 days
sponsored by PHD Virtual
SOFTWARE DOWNLOAD: This free trial provides PHD Virtual Backup for Hyper-V, an easy to use, flexible and affordable offsite backup and archiving solution.
Posted: 18 Apr 2014 | Premiered: 18 Apr 2014

PHD Virtual

Download Unitrends Enterprise Backup for Hyper-V, Free for 30 days
sponsored by Unitrends
SOFTWARE DEMO: This software trial download provides a fully functional enterprise data protection solution, featuring automated scheduling, forever incremental backups, global deduplication, instant recovery, archiving and more.
Posted: 18 Apr 2014 | Premiered: 18 Apr 2014

Unitrends

Download Unitrends Enterprise Backup for VMware, Free for 30 days
sponsored by Unitrends
SOFTWARE DEMO: This resource provides a download link for Unitrends Entrerprise Backup, which proves physical and virtual backup for 100+ versions of operating systems and applications.
Posted: 14 Apr 2014 | Premiered: 16 Apr 2014

Unitrends

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Email Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

EMC Video Surviellance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Enabling Consumer Smartphones and Tablets in the Enterprise
sponsored by Fiberlink
WEBCAST: In this webcast, join Gartner Research Vice President Phil Redman and Jim Sheward, CEO of Fiberlink, as they address the key components of an effective enterprise mobility strategy, the associated challenges, and how to keep up with the fast pace of change in mobility.
Posted: 21 Dec 2011 | Premiered: Dec 21, 2011

Fiberlink

Enabling SANLess SQL Server Failover Clusters in Amazon EC2 with DataKeeper Cluster Edition
sponsored by SIOS Technology Corp
WEBCAST: Access this on-demand webcast today to uncover top tips and best practices for enabling SANLess SQL Server failover clusters in Amazon EC2 cloud.
Posted: 26 Feb 2014 | Premiered: Feb 26, 2014

SIOS Technology Corp

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Endpoint Security Compliance: Top 19 Questions Auditors Ask
sponsored by Lumension
WEBCAST: This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Posted: 11 Apr 2014 | Premiered: Apr 11, 2014

Lumension

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Limited
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Limited

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

End-to-End Mobile Device Management
sponsored by Zenprise
WEBCAST: Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.
Posted: 08 Mar 2012 | Premiered: Mar 8, 2012

Zenprise

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®
126 - 150 of 527 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement