IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
126 - 150 of 257 Matches Previous Page  | Next Page
IT Service Brokereage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Making the Shift to a Hybrid Solution
sponsored by FrontRange Solutions Inc.
VIDEO: Investigate the leading provider of hybrid ITSM solutions and integrated client solutions around the world.
Posted: 23 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

MDM Security Features: Keys to purchasing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this expert decision center from SearchSecurity.com to find about the advanced mobile security features offered by some of the top mobile device management vendors on the market. Discover and compare how thorough each solution's features really are.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

MDM: Managing the RFP process for choosing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Download this quick read to get an overview of technical requirements for MDM solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Move from Chaos to Control: Creating a Mature File Transfer Process
sponsored by IBM
WEBCAST: When it comes to moving files between people, business, and other processes a majority of organizations are struggling.  This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Premiered: Aug 20, 2014

IBM

New Strategies for Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

Managing IT Complexity: A CIO Roundtable Discussion
sponsored by ASG Software Solutions
WEBCAST: Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations.
Posted: 28 Jul 2010 | Premiered: Aug 12, 2010, 11:00 EDT (15:00 GMT)

ASG Software Solutions

MapInfo Professional v10.5
sponsored by Pitney Bowes Business Insight
SOFTWARE DOWNLOAD: Helps organizations visualize data on a map so they can easily determine relationships between data and geography.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Pitney Bowes Business Insight

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Mission Critical Services
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
Posted: 01 Dec 2008 | Premiered: Nov 26, 2008

Hewlett-Packard Company

Mission-Critical Converged Infrastructure Podcast Series
sponsored by HP & Intel®
PODCAST: This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.
Posted: 09 May 2011 | Premiered: May 9, 2011

HP & Intel®

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

More Visibility for UK ITSP Drives Profitability
sponsored by Autotask Corporation
VIDEO: This brief video covers the value of visibility to your business.
Posted: 30 Jan 2014 | Premiered: 30 Jan 2014

Autotask Corporation

Moving Beyond People Glue and Silos
sponsored by IBM
VIDEO: This quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance.
Posted: 26 Jul 2013 | Premiered: 27 Jun 2013

IBM

Moving Technology Infrastructure into the Future: Value and Performance through Consolidation
sponsored by Hewlett-Packard Company
WEBCAST: This white paper explains the benefits of IT consolidation, which can help to reduce costs and complexities while improving efficiency and productivity.
Posted: 05 Jun 2014 | Premiered: Jan 31, 2014

Hewlett-Packard Company

Network Management Solution: WhatsUp Gold
sponsored by Ipswitch WhatsUp Gold
TRIAL SOFTWARE: WhatsUp Gold is the most intuitive, comprehensive, and cost-effective network management toolset available today.
Posted: 01 Mar 2011 | Premiered: 01 Mar 2011

Ipswitch WhatsUp Gold

NetWrix Active Directory Change Reporter - Free!
sponsored by Netwrix Corporation
SOFTWARE DOWNLOAD: Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance.
Posted: 15 Jul 2010 | Premiered: 15 Jul 2010

Netwrix Corporation

New Podcast: Adding Context to Security Alerts
sponsored by Solera Networks
PODCAST: In this podcast you’ll learn how network forensics can integrate with other security tools to provide context to any alert.
Posted: 16 Apr 2010 | Premiered: Apr 16, 2010

Solera Networks
126 - 150 of 257 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement