IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
101 - 125 of 234 Matches Previous Page  |  Next Page
Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Leveraging Software Asset Management Tools to Keep Up with Rogue IT
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
WEBCAST: IT directors today are asked to manage seemingly limitless amounts of data. Consequently, many organizations are implementing cloud initiatives to better manage this growing problem. But where should IT start? Find out in this on-demand webcast.
Posted: 13 Jun 2014 | Premiered: Jun 13, 2014

Code42

Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud
sponsored by IBM
WEBCAST: Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.
Posted: 24 Oct 2014 | Premiered: Sep 30, 2014

IBM

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Modern Infrastructure University: ITSM/ IT Management
sponsored by SearchCIO
VIRTUAL ENVIRONMENT: In this exclusive classroom session, ITSM expert Derek Lonsdale of PA Consulting clears up the confusion between asset and configuration management, offering best practices; meanwhile, CIO Niel Nickolaisen promotes the need for ITSM principles and how to achieve them.
Posted: 14 Feb 2014 | Premiered: 20 Feb 2014

SearchCIO

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware
sponsored by Intel
VIDEOCAST: While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected.
Posted: 01 Mar 2012 | Premiered: Dec 20, 2011

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Intel® Chip Chat
sponsored by Intel
PODCAST: Intel® Chip Chat is a recurring podcast series of informal, one-on-one interviews with some of the brightest minds in the industry. It strives to bring listeners closer to the innovations and inspirations of the men and women shaping the future of computing, and in the process share a little bit about the technologists themselves.
Posted: 13 Dec 2011 | Premiered: Dec 13, 2011

Intel

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

Managing IT Complexity: A CIO Roundtable Discussion
sponsored by ASG Software Solutions
WEBCAST: Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations.
Posted: 28 Jul 2010 | Premiered: Aug 12, 2010, 11:00 EDT (15:00 GMT)

ASG Software Solutions

MapInfo Professional v10.5
sponsored by Pitney Bowes Business Insight
SOFTWARE DOWNLOAD: Helps organizations visualize data on a map so they can easily determine relationships between data and geography.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Pitney Bowes Business Insight

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Mission Critical Services
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
Posted: 01 Dec 2008 | Premiered: Nov 26, 2008

Hewlett-Packard Company

Mission-Critical Converged Infrastructure Podcast Series
sponsored by HP & Intel®
PODCAST: This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.
Posted: 09 May 2011 | Premiered: May 9, 2011

HP & Intel®

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

More Visibility for UK ITSP Drives Profitability
sponsored by Autotask Corporation
VIDEO: This brief video covers the value of visibility to your business.
Posted: 30 Jan 2014 | Premiered: 30 Jan 2014

Autotask Corporation

Moving Beyond People Glue and Silos
sponsored by IBM
VIDEO: This quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance.
Posted: 26 Jul 2013 | Premiered: 27 Jun 2013

IBM

Moving Technology Infrastructure into the Future: Value and Performance through Consolidation
sponsored by Hewlett-Packard Company
WEBCAST: This white paper explains the benefits of IT consolidation, which can help to reduce costs and complexities while improving efficiency and productivity.
Posted: 05 Jun 2014 | Premiered: Jan 31, 2014

Hewlett-Packard Company
101 - 125 of 234 Matches Previous Page    3 4 5 6 7 8    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement