IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
1 - 25 of 419 Matches Previous Page  |  Next Page
"Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs
sponsored by Hewlett-Packard Enterprise
VIDEO: If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.
Posted: 05 Aug 2016 | Premiered: 30 May 2016

Hewlett-Packard Enterprise

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

6 Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST: Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

6 Questions Every CIO Should Ask About Cloud Security
sponsored by IBM
WEBCAST: Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.
Posted: 10 Feb 2017 | Premiered: Feb 10, 2017

IBM

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

A Solutions Approach to Web-Scale Storage
sponsored by IBM
WEBCAST: IDC predicts companies will face up to 80% annual growth in unstructured data. Avoid costly storage services with IBM.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Accelerating Data Center Modernization and Your Business
sponsored by Hewlett Packard Enterprise
VIDEO: Tune into this video to receive best-practice insights for modernizing your data center—from updating core applications to jump-starting big data analytics to cloud migration. Discover how to accelerate the delivery of IT services by implementing high-performance computing infrastructure, and more.
Posted: 09 Dec 2016 | Premiered: 09 Dec 2016

Hewlett Packard Enterprise

Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Enterprise
WEBCAST: Cyber crime is growing more common and more costly. Read this survey to see the numbers on exactly what you're facing.
Posted: 13 Mar 2015 | Premiered: Mar 13, 2015

TOPICS:  IT Management
Hewlett-Packard Enterprise

3 Reasons Why Traditional Hyperconvergence Is a Risky Choice
sponsored by Riverbed Technology, Inc.
WEBCAST: Hyperconvergence is a hot trend, but many solutions don't measure up. Learn how the best solutions keep data safer.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Traits of an Intelligence-Driven Security Operation Center
sponsored by Intel Security
WEBCAST: Understand the key challenges of traditional SOCs and find out what security leaders must do to build or mature an SOC.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

7 Ways SteelFusion and Branch IT Resemble Your Smartphone
sponsored by Riverbed Technology, Inc.
WEBCAST: What do smartphones and HCI have in common? Find out how to rethink IT and keep it as simple and seamless as your phone.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

8 Common Mistakes of Windows 7 Migration
sponsored by Dell, Inc.
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

Dell, Inc.

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Leap Forward In Digital Education
sponsored by NetApp
WEBCAST: Learn how Western Oregon University supports 10 times the number of concurrent users in 95% less processing time.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016

TOPICS:  IT Management
NetApp

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Accenture: Case Study: Bacardi's Hybrid System Architecture
sponsored by Microsoft
WEBCAST: Learn how high-performance analytics allowed Bacardi to improve reporting performance and reduce data load latency.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Leading Enterprises Are Reimagining ERP
sponsored by Microsoft
WEBCAST: Traditional ERP is no longer enough. Learn how to shift to New IT to boost agility and responsiveness.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: SAP HANA: Solution Overview
sponsored by Microsoft
WEBCAST: Discover how SAP HANA allows you to transform your business by conducting transactions and analysis in real time,
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: The Best Path to SAP S/4HANA Migration
sponsored by Microsoft
WEBCAST: Real-time responsiveness is now required. Learn why S/4HANA is the only answer, and how to migrate without interruption.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: Unlocking the Potential of SAP S/4HANA
sponsored by Microsoft
WEBCAST: In today's world, only high-velocity enterprises survive. Learn to drive digital advantage by leveraging SAP S/4HANA.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft
1 - 25 of 419 Matches Previous Page    1 2 3 4    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement