IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
126 - 150 of 274 Matches Previous Page  | Next Page
IT Security Challenges: Interview with Brian Glick and HP
sponsored by Hewlett-Packard Limited
WEBCAST: In this webcast, learn how to deal with security threats proactively and better understand the importance of becoming familiar with your IT's own vulnerabilities in infrastructure and applications so you're able to monitor and manage security optimally.
Posted: 07 Feb 2014 | Premiered: Feb 7, 2014

Hewlett-Packard Limited

K2 Helps a Top Game Developer Improve Efficiency
sponsored by K2
VIDEO: Access this video case study to learn how Square Enix, a top game developer, was able to leverage K2 software to save time and focus on solving new challenges.
Posted: 24 Nov 2014 | Premiered: 20 Jan 2013

K2

Kalibrate Video Postcard
sponsored by IBM
VIDEO: This video explores how one organization was able to help a client to automate its IT service management in order to deliver more scalable services to its customers. You'll learn how this approach allowed the client to move beyond a manual, paper-based system, greatly reducing process time.
Posted: 07 Nov 2014 | Premiered: 09 Jul 2014

IBM

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
WEBCAST: IT directors today are asked to manage seemingly limitless amounts of data. Consequently, many organizations are implementing cloud initiatives to better manage this growing problem. But where should IT start? Find out in this on-demand webcast.
Posted: 13 Jun 2014 | Premiered: Jun 13, 2014

Code42

Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud
sponsored by IBM
WEBCAST: Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.
Posted: 24 Oct 2014 | Premiered: Sep 30, 2014

IBM

Managed VDI Services & WaaS: What they mean to IT Leadership
sponsored by Dell, Inc.
WEBCAST: Cloud is an enabler to this transformation. Find out why the majority of IT leaders expect cloud to help them innovate, not just save money.
Posted: 14 Aug 2014 | Premiered: Jul 15, 2014

Dell, Inc.

Managed VDI Services & WaaS: What They Mean to IT Leadership
sponsored by Dell, Inc.
WEBCAST: Download this exclusive webcast now to learn about how VDI can help your organization. You'll also get insight into how you can find where VDI fits into your IT portfolio strategic get tips for deciding which models for deployment fit best from a variety of perspectives. View now to learn how you can get the most from desktop virtualization.
Posted: 12 Dec 2014 | Premiered: Dec 10, 2014

Dell, Inc.

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WEBCAST: This webcast offers tips for planning, deploying and managing a new Exchange platform that links email, voice and fax communications into one unified infrastructure, creating a seamless user interface, integrated online services and controlled compliance.
Posted: 08 Oct 2013 | Premiered: Oct 8, 2013

Dell Software

MDM Security Features: Keys to purchasing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this expert decision center from SearchSecurity.com to find about the advanced mobile security features offered by some of the top mobile device management vendors on the market. Discover and compare how thorough each solution's features really are.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

MDM: Managing the RFP process for choosing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Download this quick read to get an overview of technical requirements for MDM solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Mobilize Your Corporate Content and Intranet
sponsored by IBM
WEBCAST: This exclusive webcast examines a mobile enterprise gateway solution that provides mobile access to collaborative business resources while securing your data with authorization, encryption, and containerization policies.
Posted: 03 Mar 2014 | Premiered: Mar 3, 2014

IBM

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

Managing IT Complexity: A CIO Roundtable Discussion
sponsored by ASG Software Solutions
WEBCAST: Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations.
Posted: 28 Jul 2010 | Premiered: Aug 12, 2010, 11:00 EDT (15:00 GMT)

ASG Software Solutions

MapInfo Professional v10.5
sponsored by Pitney Bowes Business Insight
SOFTWARE DOWNLOAD: Helps organizations visualize data on a map so they can easily determine relationships between data and geography.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Pitney Bowes Business Insight

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Mission Critical Services
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
Posted: 01 Dec 2008 | Premiered: Nov 26, 2008

Hewlett-Packard Company

Mission-Critical Converged Infrastructure Podcast Series
sponsored by HP & Intel®
PODCAST: This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.
Posted: 09 May 2011 | Premiered: May 9, 2011

HP & Intel®

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM
126 - 150 of 274 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement