IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 231 Matches Previous Page  |  Next Page
Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Rackspace Private Cloud with Notre Dame
sponsored by Rackspace
VIDEO: Associate Director at the University of Notre Dame Center for Research Computing, Paul Brenner, elaborates on the fast speeds offered through OpenStack by Rackspace as their cloud provider. Within an hour or even minutes, the Center for Research Computing has a system running for a new exploratory science idea.
Posted: 29 Oct 2014 | Premiered: 17 Oct 2014

Rackspace

Raise Cyber Risk Awareness and Management in the C-Suite
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses how you can bring security to the boardroom with effective and proactive security leadership.
Posted: 27 Mar 2015 | Premiered: Dec 2, 2014

SurfWatch Labs

Red Hat Enterprise Linux Asks, What If?
sponsored by Red Hat
VIDEO: This video will introduce you to some of the opportunities Red Hat Enterprise Linux can create for your business. Watch and discover what Red Hat can do for you.
Posted: 26 Nov 2013 | Premiered: 26 Nov 2013

Red Hat

Red Hat Storage Server 3: Monitoring Overview
sponsored by Red Hat
WEBCAST: This webcast covers everything you need to know about this monitoring tool that makes it simple for storage administrators to deploy new solutions.
Posted: 14 Oct 2014 | Premiered: Oct 2, 2014

Red Hat

Redefining IT Delivery and Economics with Converged Infrastructure
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 07 Jan 2015 | Premiered: Oct 22, 2014

Hewlett-Packard Company

Security Solutions for the Application Economy
sponsored by CA Technologies.
VIDEO: This video explores a leading solution for securing users's identities across all applications and devices.
Posted: 06 Nov 2014 | Premiered: 06 Nov 2014

CA Technologies.

Systems of Engagement: The Future of Enterprise IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, Forrester Research Vice President and Principal Analyst John McCarthy describes how systems of engagement are shaping the future of enterprise IT. Tune in to learn more today.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company

Reduce the Cost and Complexity of Multi-sourced IT Environments
sponsored by Hewlett-Packard Company
WEBCAST: Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks.
Posted: 27 Jul 2012 | Premiered: May 9, 2012

Hewlett-Packard Company

Reduce Your Desktop TCO Through Client-Side Virtualization
sponsored by Virtual Computer, Inc.
WEBCAST: For most IT organizations, the operational cost of deploying, updating and migrating PCs is the most significant expense associated with the PC life cycle. IDC's Michael Rose outlines some key business considerations that you can apply to reduce your desktop TCO while providing an excellent experience for end-users.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

Virtual Computer, Inc.

Reducing IT TCO with Effective Endpoint Security Management
sponsored by Lumension
PODCAST: This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Refreshing IT Infrastructure with the Xeon Processor 5500 Series
sponsored by Intel Corporation
VIDEO: In this Videocast, learn what key points an organization looks at when thinking about a technology refresh. Gain insight into the value proposition of refreshing IT infrastructure with the Xeon Processor 5500 series and how it is essential for meeting performance, reliability and flexibility requirements.
Posted: 21 May 2009 | Premiered: 11 May 2009

Intel Corporation

Refreshing IT Infrastructure with the Xeon Processor 5500 Series
sponsored by Intel Corporation
PODCAST: In this Podcast, learn what key points an organization looks at when thinking about a technology refresh. Gain insight into the value proposition of refreshing IT infrastructure with the Xeon Processor 5500 series and how it is essential for meeting performance, reliability and flexibility requirements
Posted: 21 May 2009 | Premiered: May 11, 2009

Intel Corporation

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Service Provisioning and Configuration – Path to the Cloud with Ben Newton and David Williams
sponsored by BMC-Accenture
PODCAST: When you look at moving to the cloud and consider all the hype that’s out there, it can be difficult to know where to start. The smart place to begin is with automation. This resource explores the hype on IT automation. Learn about service provisioning, configuration, and discover a path to the cloud.
Posted: 13 Jan 2012 | Premiered: Jan 13, 2012

BMC-Accenture

Service2Media Accelerates its time to market with HP Cloud Solutions (2 min video):
sponsored by HP
VIDEOCAST: This video discusses how one company leveraged advanced cloud solutions to significantly accelerate its time to market, increasing its ROI. Learn how these new platforms can enable you to focus on your core business offering, allowing you to improve performance and efficiency.
Posted: 06 Jan 2012 | Premiered: Jan 6, 2012

HP

Seven Strategies for Effective Desktop Management
sponsored by WebEx Communications, Inc.
WEBCAST: Remote and local desktop support is an increasingly difficult and expensive task for IT staffs. Listen to this Webcast to gain seven strategies for effective desktop management so your organization can immediately manage, protect and secure its PC assets
Posted: 01 Mar 2007 | Premiered: Feb 27, 2007

WebEx Communications, Inc.

Shutting the Door on Data Theft
sponsored by Websense, Inc.
WEBCAST: Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.
Posted: 15 Sep 2011 | Premiered: Sep 15, 2011

Websense, Inc.

SMART Guidance for Exchange Migrations
sponsored by BinaryTree
WEBCAST: Microsoft Exchange Server 2013 has several new features, this webinar reviews some of these and walks through the migration process from Exchange Server 2010 or earlier.
Posted: 03 Oct 2013 | Premiered: Sep 26, 2013

BinaryTree

Smarter Planet Industry Solutions technical podcast series: Season 1
sponsored by IBM
PODCAST: Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hear a new expert discussion.
Posted: 21 Dec 2011 | Premiered: Oct 21, 2011

IBM

Streamlining SAP Upgrades with VMware Infrastructure 3
sponsored by VMware and Intel
WEBCAST: In this Webcast, speakers from VMware and SAPwill show you how VMware Infrastructure can help you upgrade your SAP applications and efficiently manage your SAP infrastructure.
Posted: 24 Nov 2008 | Premiered: Nov 21, 2008

VMware and Intel
151 - 175 of 231 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement