IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 406 Matches Previous Page  |  Next Page
Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Giving You Choice and Connected Control in the Cloud
sponsored by BT
VIDEO: Find out how a managed networked IT service helps to assess your IT needs, plan how you'll use the cloud to meet them, and support your cloud services into the future and learn how this service helps ensure the cloud infrastructure you put in place is right for you.
Posted: 01 Aug 2016 | Premiered: 19 Aug 2015

BT

Guidelines for Affordable Disaster Recovery in the Cloud
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: This multimedia classroom looks at the methods, benefits, and challenges to conducting disaster recovery in the cloud.
Posted: 15 Mar 2013 | Premiered: 19 Mar 2013

SearchCloudComputing.com

HC380: Your new VM Vending Machine
sponsored by Hewlett Packard Enterprise
VIDEO: In this video, see for yourself how quickly and effectively hyper-converged infrastructure can enable businesses to deploy new VMs faster and more efficiently than ever before. View now to learn more.
Posted: 11 May 2016 | Premiered: 11 May 2016

Hewlett Packard Enterprise

HC380: Your New VM Vending Machine
sponsored by NTT ICT
VIDEO: In this video, see for yourself how quickly and effectively hyper-converged infrastructure can enable businesses to deploy new VMs faster and more efficiently than ever before. View now to learn more.
Posted: 06 Sep 2016 | Premiered: 15 Mar 2016

NTT ICT

Henry Mayo Newhall Hospital Implements a Converged IT Infrastructure
sponsored by IBM
VIDEO: This brief video examines how Henry Mayo Newhall Hospital improved their infrastructure with an integrated, converged platform. Find out how they decreased latency for apps, increased their flexibility as an IT organization, and implemented hardware encryption.
Posted: 01 Sep 2016 | Premiered: 01 Sep 2016

IBM

How Box Platform Helps Businesses Build Better Apps
sponsored by Box
WEBCAST: Discover how to build better apps that ease secure content sharing within and outside of your enterprise. Tune in to overcome cumbersome content sharing, and discover how content Platform-as-a-Service can transform your organization—from outside users to IT.
Posted: 16 May 2016 | Premiered: May 16, 2016

Box

How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

How the Global Nature of Threats Impacts Security
sponsored by Dimension Data
WEBCAST: Cyberthreats are more sophisticated than ever. Learn why managed security services have become crucial to stay safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

How the HC380 is Changing the Hyper-Converged Market
sponsored by Hewlett Packard Enterprise
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 11 May 2016 | Premiered: 11 May 2016

Hewlett Packard Enterprise

How the HC380 is Changing the Hyper-Converged Market
sponsored by NTT ICT
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 06 Sep 2016 | Premiered: 16 Mar 2016

NTT ICT

How to Benefit from Analyzing Virtualization Performance
sponsored by SearchServerVirtualization
VIRTUAL ENVIRONMENT: Culling the right performance data, from both physical and virtual servers, is a challenge unto itself; however, it's a challenge made all the more complicated when there's also no clear consensus on the tools and techniques for monitoring this performance. Luckily, this classroom can help.
Posted: 28 Jul 2014 | Premiered: 29 Jul 2014

SearchServerVirtualization

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

Get More Virtual: Protecting Microsoft Applications with Dell and VMware vSphere 4
sponsored by Dell, Inc.
WEBCAST: Watch this webcast to learn how to ensure application security and availability in your VMware environment. Discover how to provide quick recovery of applications and how to use automation for server application protection.
Posted: 20 Oct 2009 | Premiered: Oct 20, 2009

Dell, Inc.

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

Get to Know the Citrix Ready Marketplace
sponsored by Citrix Ready
VIDEO: Learn about the Citrix Ready Marketplace, a one-stop-shop for you to explore and evaluate Citrix compatible third-party products and solutions for virtualization, mobility, cloud, and networking.
Posted: 08 Aug 2016 | Premiered: 06 Mar 2016

Citrix Ready

Going Crazy Without File Type Association?
sponsored by Dell
VIDEO: File type association is essential. Watch how it can help your employees save time—and maybe even their sanity.
Posted: 28 Jan 2015 | Premiered: 28 Jan 2015

TOPICS:  IT Management
Dell

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

High Performance Graphics for Virtual Desktops
sponsored by NVIDIA/VMware
VIDEO: Graphics-rich apps are more popular than ever—but they require better VDI. Learn about the best offerings on the market.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Data Systems

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

How LexisNexis Empowers Its Service Team
sponsored by Oracle Corporation
WEBCAST: Find out how LexisNexis keeps customers happy and empowers employees with simpler interfaces on mobile and desktop.
Posted: 28 Jan 2016 | Premiered: Jan 28, 2016

TOPICS:  IT Management
Oracle Corporation

How Many Clicks Does It Take to Get to the Center of VDI?
sponsored by Dell, Inc. and Intel®
WEBCAST: How many tasks can one platform automate? Learn about comprehensive solutions simple enough for any organization to use.
Posted: 16 Sep 2015 | Premiered: Sep 16, 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

How One Solution Handled Federal Government Security Demands
sponsored by Riverbed Technology, Inc.
WEBCAST: The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

How to Bring Business Continuity (BC) to the Branch
sponsored by Riverbed Technology, Inc.
WEBCAST: Continuity is for more than data centers. Learn how to extend BC to remote branches, and how this prevents catastrophe.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.
151 - 175 of 406 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement