IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 250 Matches Previous Page  |  Next Page
Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Next-Level Authentication: Intelligent Location-Based Strategies
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Overcoming Big Data Center Challenges with StruxureWare
sponsored by Schneider Electric
VIDEO: You can have a single pane of glass to control and optimize your business through StruxureWare from Schneider Electric. No more scattered spreadsheets. No more functional silos. Download the video and discover how to reduce capital and operational expenditure by 30%.
Posted: 06 Nov 2014 | Premiered: 12 Jun 2013

Schneider Electric

Re-Imagining Business in the Digital Economy
sponsored by SAP America, Inc.
WEBCAST: In this webcast, join Amr El Meleegy and Christopher Dinkel as they describe tech trends that are inspiring disruption across the organization. Learn how to leverage these disruptors by enabling IT with technical debt reversal, social activation, cloud orchestration, and more.
Posted: 10 Aug 2015 | Premiered: Jun 25, 2015

SAP America, Inc.

Nimsoft Monitor for Microsoft Applications
sponsored by Nimsoft, Inc.
WEBCAST: Discover how a US based cloud computing and managed service provider benefited from proactively managing their applications with a next-generation strategy. Find out how this innovative approach allowed them to improve efficiency by 15-20%.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

One-Stop Shop: Best Practices to Streamline your Service Desk
sponsored by Nimsoft, Inc.
WEBCAST: Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator of knowledge and the service catalog, you need to provide excellent service and quick response times. Watch this webcast and discover the most current recommendations for service delivery and management best practices.
Posted: 05 Jan 2012 | Premiered: Sep 22, 2011

Nimsoft, Inc.

Online Trial: Rational System Architect
sponsored by IBM
SOFTWARE DOWNLOAD: Try IBM® Rational® System Architect® V11.3, which enables business managers and IT professionals to plan, model, and execute changes to improve their business strategy and process as well as the IT systems and infrastructure that support them, enabling successful enterprise planning and transformation.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

Oracle Advanced Customer Services: Solution Support Center
sponsored by Oracle Corporation
WEBCAST: The Oracle Solution Support Center, Oracle's most comprehensive Advanced Customer Service, is the best way to protect mission-critical operations and drive business success.
Posted: 18 Feb 2008 | Premiered: Feb 18, 2008

Oracle Corporation

Oracle Database 11g Product Family (Spanish version)
sponsored by Oracle Corporation
WEBCAST: Read this white paper to get an overview of the Oracle Database family of products and learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2.
Posted: 25 Oct 2010 | Premiered: Sep 25, 2009

Oracle Corporation

Oracle's New Powerful and Integrated X86 Systems
sponsored by Oracle Corporation
WEBCAST: View our Launch Webcast to learn more about Oracle's new comprehensive line of powerful x86 systems ranging from blades and rackmount servers to networking systems based on Intel's Xeon 5600 and 7500 processors. 
Posted: 13 Apr 2011 | Premiered: Apr 12, 2011

Oracle Corporation

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation

PacketTrap MSP 6.0
sponsored by Dell Software
TRIAL SOFTWARE: PacketTrap MSP addresses critical challenges service providers face with their customer's networks including: traffic analysis, application and VoIP monitoring, as well as virtualization and private/public cloud management.
Posted: 24 Aug 2011 | Premiered: 23 Aug 2011

Dell Software

PlateSpin Recon: Virtual Capacity Management and Consolidation Planning
sponsored by Novell, Inc.
WEBCAST: Watch this webcast to learn about a new unique workload profiling tool that takes the guess work out of identifying underutilized physical servers and virtual hosts. Learn how to leverage this tool for improved use and longer life of your current hardware.
Posted: 28 Aug 2009 | Premiered: Aug 28, 2009

Novell, Inc.

PODCAST: Defend IT, Delight Users and Launch BSM with Network and User Service Alignment
sponsored by ASG Software Solutions
PODCAST: Find out how implementing user service alignment in your organization allows IT to become a revenue driver, lowers resource costs, maximizes infrastructure utilization, and achieves true BSM.
Posted: 25 Mar 2010 | Premiered: Mar 25, 2010

ASG Software Solutions

Podcast: Enable Enterprise Agility by Managing Feedback Loops
sponsored by Hewlett-Packard Company
PODCAST: This webcast covers the importance of automated feedback loops in the creating a more agile data center.
Posted: 03 Dec 2013 | Premiered: Nov 18, 2013

Hewlett-Packard Company

Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud
sponsored by Intel
PODCAST: Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.
Posted: 12 Oct 2011 | Premiered: Oct 11, 2011

Intel

Podcast: Security across your enterprise mobile devices: What you need to know
sponsored by BlackBerry
PODCAST: This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Podcast: Why SAP ERP As A Platform For Growth?
sponsored by itelligence, Inc.
PODCAST: Midsized organizations are challenged to strike the right balance between reducing costs and making targeted investments for future success.  This session teaches you how to optimize the implementation of your ERP deployment for maximum gain.
Posted: 14 Oct 2010 | Premiered: Oct 14, 2010

itelligence, Inc.

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Powering Tomorrow’s Cloud – An Overview
sponsored by Intel
VIDEOCAST: While a move to the cloud can benefit most enterprises, it is often time consuming and burdensome on your budget. Access this white paper to learn how to utilize technologies to optimize your cloud experience.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.”
Posted: 21 Dec 2010 | Premiered: Feb 23, 2011, 11:00 EST (16:00 GMT)

Oracle Corporation

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company
151 - 175 of 250 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement