IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key Encryption Multimedia (View All Report Types)
126 - 150 of 611 Matches Previous Page  |  Next Page
Data Centers at Your Door: Prefabricated Modules from Schneider Electric
sponsored by Schneider Electric
VIDEO: Prefabricated data centers allow you to do just this. Access this video to learn how prefabricated IT and hydronics modules from Schneider Electric allow you to deliver a flexible and efficient data center built specifically for your needs without any of the guesswork.
Posted: 31 Oct 2014 | Premiered: 12 Jun 2014

Schneider Electric

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Deliver Service Management and Unified Endpoint Management Software from a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: This video discusses how IT can deploy service management and unified endpoint management software both on-premise and in the cloud from a single platform, allowing for greater automation and streamlined operations.
Posted: 20 Apr 2015 | Premiered: 13 Nov 2014

FrontRange Solutions Inc.

Dell Converged Infrastructure Webcast
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to find out how converged infrastructures offer a way to combine the power of server, storage, and networking into one system. Take a look to see what Dell has to offer for converged infrastructures including architecture options available for compute, storage, networking, and management and monitoring.
Posted: 04 May 2015 | Premiered: May 4, 2015

Dell, Inc. and Intel®

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 3
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Dell, Inc. and Intel®

Data Deduplication
sponsored by CDW Corporation
VIDEOCAST: This videocast from CDW Corporation will take a brief, yet comprehensive look at Data Deduplication and the distinct, operational advantages this type of storage system can have on your every day business activity when compared with traditional backup methods. View now to learn more.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

CDW Corporation

Data Deduplication FAQ Podcast
sponsored by Quantum Corporation
PODCAST: This expert Podcast, featuring Jerome Wendt, President and Lead Analyst of DCIG, Inc. puts an end to the confusion by offering insights to the most commonly asked questions he hears in the field today.
Posted: 19 Dec 2007 | Premiered: Aug 12, 2008

Quantum Corporation

Data Loss Prevention (DLP) Solutions Spotlight
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 23 Sep 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Data Loss Prevention from the Inside Out
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization.
Posted: 08 Jul 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Data Protection for Virtual Environments
sponsored by Quantum Corporation
WEBCAST: Please join this webcast as Randy Glissmann, Solutions Marketing Manager, Quantum, explains Quantum solutions for virtual server data protection. Greg Schulz, Founder and Sr. Analyst – The StorageIO Group and author of "Resilient Storage Networks" and "The Green and Virtual Data Center," will also be speaking.
Posted: 20 Aug 2009 | Premiered: Sep 26, 2008

Quantum Corporation

Data Protection for Virtual Environments Webcast
sponsored by Quantum Corporation
WEBCAST: In this webcast, Greg Schulz, Founder and Senior Analyst at The StorageIO Group, and Randy Glissman, Solutions Marketing Manager at Quantum, explore solutions for virtual server data protection and discuss general data center trends and perspectives.
Posted: 22 Sep 2009 | Premiered: Sep 21, 2009

Quantum Corporation

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Dell Compellent for Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WEBCAST: Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.
Posted: 27 Apr 2012 | Premiered: Apr 18, 2012, 01:00 EDT (05:00 GMT)

Dell, Inc.

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST: This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009

Dell Software

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix
126 - 150 of 611 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement