IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Public Key Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography, Public Key Cryptography, PKE, Asymmetric Cryptography
DEFINITION: In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.
Public Key Encryption Multimedia (View All Report Types)
76 - 100 of 599 Matches Previous Page  |  Next Page
Case Study: Simple Steps to Building a Reliable Data Center
sponsored by Veeam Software
WEBCAST: This case study highlights the partnership of Steria and Veeam. Together, they built a data center that could keep up with demands and manage big data in a complex, multitenant VMware vSphere environment.
Posted: 06 May 2014 | Premiered: Apr 15, 2014

Veeam Software

Challenges and Strategies for the Collaborative, BYOD/Mobile Workforce
sponsored by BlackBerry
WEBCAST: This webcast demonstrates how to take mobile productivity to a new level by implementing secure communication and access to data behind the firewall or in the cloud. Learn how to optimize enterprise mobility management when you connect employees to data, apps, services, and of course, each other.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

BlackBerry

Collaboration: Delivering a More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Comprehensive Virtualization Administration in One Place
sponsored by Tintri
WEBCAST: This video explores the features of an administrative portal for virtual environments to help you discover what tools you need to better administer your own.
Posted: 29 Jun 2015 | Premiered: Jun 29, 2015

Tintri

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Limited
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Limited

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Channel Success Stories: The SMB Market Case Study: KIS
sponsored by Dell PartnerDirect and Intel
PODCAST: This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market.
Posted: 15 Dec 2008 | Premiered: Dec 15, 2008, 09:00 EST (14:00 GMT)

Dell PartnerDirect and Intel

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Citrix Ready with Caringo: Foundation to a Successful Cloud Storage Service
sponsored by Citrix Ready and Caringo
WEBCAST: In this webinar you will learn how to select object storage software that delivers value through enterprise feature sets, reduce infrastructure management and eliminate service downtime, deploy and administer a cloud storage service, facilitate the broadest range of access to your cloud storage service and much more.
Posted: 30 Aug 2013 | Premiered: Sep 12, 2013


Citrix XenClient
sponsored by Citrix
PRODUCT DEMO: Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    
Posted: 14 May 2010 | Premiered: 12 May 2010

Citrix

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett-Packard Company
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett-Packard Company

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel
76 - 100 of 599 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement