IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.
Public Key Encryption Multimedia (View All Report Types)
26 - 50 of 798 Matches Previous Page  |  Next Page
A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

Agile Development to Transform Your Application Testing Program
sponsored by IBM
WEBCAST: Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.
Posted: 21 Sep 2017 | Premiered: May 18, 2017

IBM

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

A Solutions Approach to Web-Scale Storage
sponsored by IBM
WEBCAST: IDC predicts companies will face up to 80% annual growth in unstructured data. Avoid costly storage services with IBM.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Accenture: Case Study: Bacardi's Hybrid System Architecture
sponsored by Microsoft
WEBCAST: Learn how high-performance analytics allowed Bacardi to improve reporting performance and reduce data load latency.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Leading Enterprises Are Reimagining ERP
sponsored by Microsoft
WEBCAST: Traditional ERP is no longer enough. Learn how to shift to New IT to boost agility and responsiveness.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: SAP HANA: Solution Overview
sponsored by Microsoft
WEBCAST: Discover how SAP HANA allows you to transform your business by conducting transactions and analysis in real time,
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: The Best Path to SAP S/4HANA Migration
sponsored by Microsoft
WEBCAST: Real-time responsiveness is now required. Learn why S/4HANA is the only answer, and how to migrate without interruption.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: Unlocking the Potential of SAP S/4HANA
sponsored by Microsoft
WEBCAST: In today's world, only high-velocity enterprises survive. Learn to drive digital advantage by leveraging SAP S/4HANA.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Acronis vmProtect 6
sponsored by Acronis
TRIAL SOFTWARE: Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Posted: 14 Dec 2011 | Premiered: 14 Dec 2011

Acronis

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

ActivEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try.
Posted: 17 Oct 2013 | Premiered: 17 Oct 2013

Acronis

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

All-Flash Storage Boosts Telecom's Performance Guarantees
sponsored by NetApp
VIDEO: Learn why matching the performance of compute, network and storage to the workload needs of enterprise customers is key.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

American Equipment, Symantec Technologies and Wasatch Software Success
sponsored by Symantec Corporation
VIDEO: Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.
Posted: 05 Jul 2012 | Premiered: 05 Jul 2012

Symantec Corporation

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

Virtual Computer, Inc.

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva
26 - 50 of 798 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement