IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
101 - 125 of 254 Matches Previous Page  |  Next Page
IBM IT Operations Analytics Come to Life
sponsored by IBM
VIDEO: This video explains the uses of predictive IT operations analytics with a short demonstration on how experts are alerted about possible anomalies or other problems within an application. See how you can use this reactive process to shrink the time it takes to identify and fix t problems in your application environment.
Posted: 18 Sep 2015 | Premiered: 18 Sep 2015


Infrastructure Shopping with an Ever-Shrinking Budget
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast shows three IT professionals break down the best ways to make major changes in your enterprise IT.
Posted: 24 Sep 2015 | Premiered: May 20, 2015

Dell, Inc. and Intel®

IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


Leverage Static Analysis in Automotive Functional Safety
sponsored by Rogue Wave Software
WEBCAST: This webinar explores how static code analysis can be used as a real contributor to functional safety, rather than just deployed as a means of ticking another box during an audit.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

HP-UX 11i on Integrity servers: HP value for Solaris users
sponsored by Hewlett-Packard Limited
WEBCAST: Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users.
Posted: 19 May 2010 | Premiered: Jan 1, 2010

Hewlett-Packard Limited

Hybrid IT Service Management
sponsored by FrontRange Solutions Inc.
VIDEO: This brief, two minute video will teach you about a single-platform IT service management (ITSM) solution that provides flexible deployment options, reduces IT costs, improves service delivery, and more.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

Hyper-V Deployment and Best Practices
sponsored by Microsoft
WEBCAST: In this webcast a Senior Product Manager from the Windows Virtualization team discusses the Hyper-V virtualization capabilities built into Windows Server 2008. It offers an overview of system requirements, and best practices for successful depl...
Posted: 05 Dec 2008 | Premiered: Dec 5, 2008


IBM Advances Research Through Cloud Computing to Help Solve Real-World Problems
sponsored by IBM
VIDEO: Watch this video to see how IBM is helping research organizations take advantage of cloud computing solutions to help these groups do more with less.
Posted: 22 Sep 2010 | Premiered: 22 Sep 2010


IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014


IBM developerWorks tech talk series for cloud computing - Live technical sessions with cloud experts
sponsored by IBM
WEBCAST: Cloud computing is all the buzz in the IT world and as you begin planning your cloud adoption strategy, you must be sure that you leverage the right technologies to smooth the transition. Check out this webcast to review key insights on how to optimize your cloud computing projects.
Posted: 30 Apr 2012 | Premiered: May 1, 2012


IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013


IBM Tivoli Live Monitoring Services Demo
sponsored by IBM
PRODUCT DEMO: Watch this demo to see how Tivoli Live can help you manage the health and performance of your data center's resources—including operating systems, virtualized servers, middleware and applications.
Posted: 20 May 2011 | Premiered: 20 May 2011


Increase Utilization, Decrease Energy Costs With Data Center Virtualization
sponsored by Hewlett-Packard Company
WEBCAST: This webcast explores answers to some of the key questions around getting started with virtualization. It addresses cost savings, weighing benefits vs. risks, transitioning from older platforms to new ones, best practices and more.
Posted: 21 May 2008 | Premiered: Jun 19, 2008, 12:00 EDT (16:00 GMT)

Hewlett-Packard Company

Increase your Citrix XenDesktop monitoring capabilities using HP Operations Management Software
sponsored by Citrix Ready and ComTrade
WEBCAST: Join us to learn how ComTrade's Smart Plug-in for Citrix (Citrix SPI) helps you measure, monitor and manage XenDesktop and gives you an end-to-end overview from within the HP Operations Manager and HP BSM.
Posted: 06 Sep 2012 | Premiered: Sep 26, 2012, 13:00 EDT (17:00 GMT)

Citrix Ready and ComTrade

Innovators Demo Part II - Your Collaboration Destiny Continues
sponsored by IBM
PRODUCT DEMO: Embark on this interactive journey with the Innovators agents. They clearly show you how to think differently, act differently, communicate and collaborate in new ways - even while on the move - making you and your team more productive and connected.
Posted: 18 Jun 2010 | Premiered: 17 Jun 2010


Intel Cloud Builders Reference Architecture: Canonical and Cloud Computing Interoperability
sponsored by Intel
VIDEOCAST: Many businesses are looking to create a cloud solution with interoperability between clouds, but it’s no easy task. This brief video explores common challenges associated with building interoperable private clouds and introduces advanced solutions you can leverage to overcome them.
Posted: 01 Mar 2012 | Premiered: Oct 28, 2011


Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware
sponsored by Intel
VIDEOCAST: While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected.
Posted: 01 Mar 2012 | Premiered: Dec 20, 2011


Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012


Intel® Chip Chat
sponsored by Intel
PODCAST: Intel® Chip Chat is a recurring podcast series of informal, one-on-one interviews with some of the brightest minds in the industry. It strives to bring listeners closer to the innovations and inspirations of the men and women shaping the future of computing, and in the process share a little bit about the technologists themselves.
Posted: 13 Dec 2011 | Premiered: Dec 13, 2011


Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014


Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.
101 - 125 of 254 Matches Previous Page    3 4 5 6 7 8    Next Page
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement