IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative  … 
Definition continues below.
Public Key EncryptionMultimedia (View All Report Types)
76 - 100 of 566 Matches Previous Page  | Next Page
Capacity Management and Planning Made Easy
sponsored by Avocent
WEBCAST: Watch this webcast to learn about a software tool that can help you plan your data center layout in order to avoid the challenges of IT confusion, insufficient cabling, lack of cooling, and high power usage.
Posted: 19 May 2014 | Premiered: May 19, 2014

Avocent

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Cloud Breaks IT: How a Broker Platform Can Help IT Harness the Power of Cloud
sponsored by Gravitant
WEBCAST: This exclusive webcast details how the cloud is not as easy, fast and cheap as people assume and offers cloud service brokerage as an important tool.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Gravitant

Cloud-based Email Q&A: Pros, Cons, and Tips for Success
sponsored by Mimecast
WEBCAST: In this webcast, uncover survey results on cloud-based email, including discussions on migration, benefits, and deployment.
Posted: 11 Jun 2014 | Premiered: Jun 11, 2014

Mimecast

Collaboration gives GE more dynamic, secure mobile workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Collect, store, analyze all your operations log data
sponsored by Hewlett-Packard Company
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Channel Success Stories: The SMB Market Case Study: KIS
sponsored by Dell PartnerDirect and Intel
PODCAST: This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market.
Posted: 15 Dec 2008 | Premiered: Dec 15, 2008, 09:00 EST (14:00 GMT)

Dell PartnerDirect and Intel

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service
sponsored by Citrix Ready and Caringo
WEBCAST: In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.
Posted: 30 Aug 2013 | Premiered: Sep 12, 2013


Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett-Packard Company
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett-Packard Company

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Limited and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Limited and Intel ®
76 - 100 of 566 Matches Previous Page    2 3 4 5 6 7    Next Page
 
PUBLIC KEY ENCRYPTION DEFINITION (continued): … In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. The risk in this system is that if either party loses the key or it is stolen, the system is broken. A more recent alternative is to use a combination of public and private keys. In this system, a public key is used together with a private key. See public key infrastructure (PKI) for more information.
Public Key Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement