IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
126 - 150 of 271 Matches Previous Page  | Next Page
IT Overwhelmed by Workforce Mobility? The Benefits of IT Desk Services
sponsored by Hewlett-Packard Limited
VIDEO: This video covers a service provider that is here to help by reducing support costs with a single point of contact for all IT requests. Access this resource now and find out all about this service, including its core components.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

Hewlett-Packard Limited

IT Service Brokerage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Making the Shift to a Hybrid Solution
sponsored by FrontRange Solutions Inc.
VIDEO: Investigate the leading provider of hybrid ITSM solutions and integrated client solutions around the world.
Posted: 23 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WEBCAST: This webcast offers tips for planning, deploying and managing a new Exchange platform that links email, voice and fax communications into one unified infrastructure, creating a seamless user interface, integrated online services and controlled compliance.
Posted: 08 Oct 2013 | Premiered: Oct 8, 2013

Dell Software

MDM Security Features: Keys to purchasing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this expert decision center from SearchSecurity.com to find about the advanced mobile security features offered by some of the top mobile device management vendors on the market. Discover and compare how thorough each solution's features really are.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

MDM: Managing the RFP process for choosing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Download this quick read to get an overview of technical requirements for MDM solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Intel Cloud Builders Reference Architecture: Canonical and Cloud Computing Interoperability
sponsored by Intel
VIDEOCAST: Many businesses are looking to create a cloud solution with interoperability between clouds, but it’s no easy task. This brief video explores common challenges associated with building interoperable private clouds and introduces advanced solutions you can leverage to overcome them.
Posted: 01 Mar 2012 | Premiered: Oct 28, 2011

Intel

Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware
sponsored by Intel
VIDEOCAST: While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected.
Posted: 01 Mar 2012 | Premiered: Dec 20, 2011

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Intel® Chip Chat
sponsored by Intel
PODCAST: Intel® Chip Chat is a recurring podcast series of informal, one-on-one interviews with some of the brightest minds in the industry. It strives to bring listeners closer to the innovations and inspirations of the men and women shaping the future of computing, and in the process share a little bit about the technologists themselves.
Posted: 13 Dec 2011 | Premiered: Dec 13, 2011

Intel

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010

ManageEngine

Managing IT Complexity: A CIO Roundtable Discussion
sponsored by ASG Software Solutions
WEBCAST: Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations.
Posted: 28 Jul 2010 | Premiered: Aug 12, 2010, 11:00 EDT (15:00 GMT)

ASG Software Solutions

MapInfo Professional v10.5
sponsored by Pitney Bowes Business Insight
SOFTWARE DOWNLOAD: Helps organizations visualize data on a map so they can easily determine relationships between data and geography.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Pitney Bowes Business Insight

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Mission Critical Services
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
Posted: 01 Dec 2008 | Premiered: Nov 26, 2008

Hewlett-Packard Company

Mission-Critical Converged Infrastructure Podcast Series
sponsored by HP & Intel®
PODCAST: This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.
Posted: 09 May 2011 | Premiered: May 9, 2011

HP & Intel®

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

More Visibility for UK ITSP Drives Profitability
sponsored by Autotask Corporation
VIDEO: This brief video covers the value of visibility to your business.
Posted: 30 Jan 2014 | Premiered: 30 Jan 2014

Autotask Corporation
126 - 150 of 271 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement