IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.
Public Key Encryption Multimedia (View All Report Types)
26 - 50 of 753 Matches Previous Page  |  Next Page
Advancing Infratsructure to Containers and Beyond
sponsored by CoreOS
WEBCAST: Security has become a relative phrase. We may think we're secure, but it only ever takes that one bug to bring your organization down. It's time to think about security in a new way. Watch this lecture from CoreOS CEO Alex Polvi, and find out how containers could help your organization stay secure.
Posted: 30 May 2017 | Premiered: May 24, 2017

TOPICS:  Security
CoreOS

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

An Introduction to Open Source Licensing: A Legal Perspective
sponsored by Flexera Software
WEBCAST: There is a lot of confusion when it comes to open source software (OSS). Discover a detailed presentation from expert Andrew Hall on what OSS is and its fundamentals, risks, benefits, obligations, restrictions, and how to ensure your organization is protected.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Flexera Software

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Leading Enterprises Are Reimagining ERP
sponsored by Microsoft
WEBCAST: Traditional ERP is no longer enough. Learn how to shift to New IT to boost agility and responsiveness.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: SAP HANA: Solution Overview
sponsored by Microsoft
WEBCAST: Discover how SAP HANA allows you to transform your business by conducting transactions and analysis in real time,
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: The Best Path to SAP S/4HANA Migration
sponsored by Microsoft
WEBCAST: Real-time responsiveness is now required. Learn why S/4HANA is the only answer, and how to migrate without interruption.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: Unlocking the Potential of SAP S/4HANA
sponsored by Microsoft
WEBCAST: In today's world, only high-velocity enterprises survive. Learn to drive digital advantage by leveraging SAP S/4HANA.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Acronis vmProtect 6
sponsored by Acronis
TRIAL SOFTWARE: Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Posted: 14 Dec 2011 | Premiered: 14 Dec 2011

Acronis

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

ActivEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try.
Posted: 17 Oct 2013 | Premiered: 17 Oct 2013

Acronis

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

All-Flash Storage Boosts Telecom's Performance Guarantees
sponsored by NetApp
VIDEO: Learn why matching the performance of compute, network and storage to the workload needs of enterprise customers is key.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

American Equipment, Symantec Technologies and Wasatch Software Success
sponsored by Symantec Corporation
VIDEO: Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.
Posted: 05 Jul 2012 | Premiered: 05 Jul 2012

Symantec Corporation

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

Virtual Computer, Inc.

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.
26 - 50 of 753 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement