IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
1 - 25 of 236 Matches Previous Page  | Next Page
A Pragmatic Approach to Benchmarking Application Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, a pragmatic approach is introduced to benchmark application security.
Posted: 25 Jun 2014 | Premiered: Jun 25, 2014

Veracode, Inc.

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Accelerate your Managed Services with the MSP Playbook and get an exclusive look at our new MSP Playbook
sponsored by N-able Technologies
WEBCAST: Tune in now to access a helpful how-to playbook for understanding best business practices for your organization as a managed services provider (MSP).
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Accessing Your Cloud Risk
sponsored by Sophos, Inc.
WEBCAST: This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.
Posted: 18 Jul 2014 | Premiered: Jul 10, 2014

Sophos, Inc.

An RMM Solution for your Managed Services
sponsored by N-able Technologies
WEBCAST: This helpful video takes a look at a solution that is designed specifically to help MSPs provide high-quality services efficiently and effectively while proactively managing the users' IT environments.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Automating your Microsoft World: Application Efficiencies
sponsored by N-able Technologies
WEBCAST: Watch this exclusive video to learn how to leverage an automation manager tool to streamline the performance of key Microsoft applications.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Automating your Microsoft World: Operating System Efficiencies
sponsored by N-able Technologies
WEBCAST: This informative video examines how you can leverage an automation manager to improve cloud efficiencies and streamline application performance and delivery.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Better Service and Tighter Control: Innovations in Service Catalogs
sponsored by Hewlett-Packard Company
WEBCAST: In this on-demand webcast, discover how IT can deliver IT services more efficiently with an orchestrated approach to service portfolio management and the service catalog.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Hewlett-Packard Company

Building Mission Critical Wireless for Apple Devices
sponsored by Extreme Networks
WEBCAST: This exclusive presentation discusses how you can best manage mobile devices on your network so that users get the services they want and IT gets the control it needs. While this webinar specifically addresses iOS devices, it's lessons can also be applied to the other leading mobile platforms.
Posted: 13 Jan 2014 | Premiered: Jan 13, 2014

Extreme Networks

Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP

8 Common Mistakes of Windows 7 Migration
sponsored by Dell, Inc.
WEBCAST: Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program
Posted: 15 Apr 2011 | Premiered: Apr 27, 2011, 12:00 EDT (16:00 GMT)

Dell, Inc.

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc

Best Practices in Application Performance Management
sponsored by CA Technologies.
PODCAST: In this podcast, discover what is meant by an end-to-end approach to Application Performance Management and, from the perspective of the IT organization, why it's so critical.
Posted: 31 Mar 2008 | Premiered: Mar 31, 2008, 09:00 EDT (13:00 GMT)

CA Technologies.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Business Process Management and Enterprise Architecture for Better Business Outcomes
sponsored by IBM
WEBCAST: This webcast explores how WebSphere and IBM Rational work together to help businesses achieve strategic objectives with reduced risk and cost and also for translating business vision and strategy into architectural change.
Posted: 16 Jun 2010 | Premiered: Jun 24, 2010, 12:00 EDT (16:00 GMT)

IBM

Buy Microsoft Office 365 Trial Download
sponsored by Microsoft
SOFTWARE DOWNLOAD: See the familiar software features of next-generation communications to deliver the power of cloud computing and download this trial of Microsoft Office 365.
Posted: 02 Aug 2012 | Premiered: 02 Aug 2012

Microsoft

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

VMware
1 - 25 of 236 Matches Previous Page    1 2 3 4    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement