IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 376 Matches Previous Page  |  Next Page
How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016


How the Global Nature of Threats Impacts Security
sponsored by Dimension Data
WEBCAST: Cyberthreats are more sophisticated than ever. Learn why managed security services have become crucial to stay safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

How the HC380 is Changing the Hyper-Converged Market
sponsored by NTT ICT
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 06 Sep 2016 | Premiered: 16 Mar 2016


How to Achieve Transformative Business Outcomes with ITSM
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower operational costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

How to Benefit from Analyzing Virtualization Performance
sponsored by SearchServerVirtualization
VIRTUAL ENVIRONMENT: Culling the right performance data, from both physical and virtual servers, is a challenge unto itself; however, it's a challenge made all the more complicated when there's also no clear consensus on the tools and techniques for monitoring this performance. Luckily, this classroom can help.
Posted: 28 Jul 2014 | Premiered: 29 Jul 2014


How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

How to Optimize Azure for Public, Private or Hybrid Cloud
sponsored by Rackspace
WEBCAST: Access this resource to hear two experts discuss important use cases and how to maximize your investment in Azure.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

TOPICS:  IT Management

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

HPE Hyper Converged 380 GUI Desktop and Mobile Demo
sponsored by NTT ICT
VIDEO: Tune into this video to adopt a hyper-converged system that easily enables users to create and flourish with virtual environments. Access now to discover a more intuitive way to help end-users without virtualization experience gain the full benefits of hyper-convergence without the need of countless real-world practice hours.
Posted: 10 Aug 2016 | Premiered: 25 Mar 2016


HPE Hyper Converged: "Your VM Vending Machine"
sponsored by NTT ICT
VIDEO: Conflicted IT professional, meet hyper-convergence. Access now to find out what one chosen hyper converged system can do for your business in the following video, and get started on the path to a simplified, efficient, cost-effective, and future-ready IT infrastructure.
Posted: 09 Aug 2016 | Premiered: 15 Mar 2016


HPE, The Right Service Partner
sponsored by Hewlett Packard Enterprise
VIDEO: This concise video describes the challenges you have when deciding to transform their IT to address the idea economy and how to overcome these challenges through a service partner who will guide you in the evolution of your IT system to the right mix while it continues to operate.
Posted: 02 Aug 2016 | Premiered: 11 Feb 2016

Hewlett Packard Enterprise

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Data Systems

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

How LexisNexis Empowers Its Service Team
sponsored by Oracle Corporation
WEBCAST: Find out how LexisNexis keeps customers happy and empowers employees with simpler interfaces on mobile and desktop.
Posted: 28 Jan 2016 | Premiered: Jan 28, 2016

TOPICS:  IT Management
Oracle Corporation

How One Solution Handled Federal Government Security Demands
sponsored by Riverbed Technology, Inc.
WEBCAST: The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

How to Bring Business Continuity (BC) to the Branch
sponsored by Riverbed Technology, Inc.
WEBCAST: Continuity is for more than data centers. Learn how to extend BC to remote branches, and how this prevents catastrophe.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

How to Slash RPO and RTO for Timely, Dependable Recovery
sponsored by Riverbed Technology, Inc.
WEBCAST: Backup and recovery is crucial for ROBOs. Find out why not all solutions are created equal, and how to maximize speed.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

How You Can Leverage CA 3Tera AppLogic
sponsored by CA Technologies.
VIDEO: Watch this video and learn how you can leverage CA 3Tera AppLogic to roll out new business applications and services faster than you thought was possible. Bring the power of the cloud to your company.
Posted: 22 Mar 2011 | Premiered: 22 Mar 2011

CA Technologies.

HP helps United Airlines consolidate their IT infrastructure
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief video case study examines how United Airlines was able to consolidate its IT infrastructure and fuel customer experience success with the right service. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Enterprise

HP-UX 11i on Integrity servers: HP value for Solaris users
sponsored by Hewlett-Packard Enterprise
WEBCAST: Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users.
Posted: 19 May 2010 | Premiered: Jan 1, 2010

Hewlett-Packard Enterprise

Hybrid IT Service Management
sponsored by FrontRange Solutions Inc.
VIDEO: This brief, two minute video will teach you about a single-platform IT service management (ITSM) solution that provides flexible deployment options, reduces IT costs, improves service delivery, and more.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

Hyper Convergence in the Era of Always-On Business
sponsored by HPE and Veeam
WEBCAST: In this expert webcast, discover why hyper convergence remains such a big deal for virtualized environments—and separate fact from vendor hype. Tune in to examine how hyper convergence-based data center modernization will help you set the stage for high availability and rapid recoverability.
Posted: 06 Apr 2016 | Premiered: Mar 23, 2016

HPE and Veeam

Hyper-V Deployment and Best Practices
sponsored by Microsoft
WEBCAST: In this webcast a Senior Product Manager from the Windows Virtualization team discusses the Hyper-V virtualization capabilities built into Windows Server 2008. It offers an overview of system requirements, and best practices for successful depl...
Posted: 05 Dec 2008 | Premiered: Dec 5, 2008

151 - 175 of 376 Matches Previous Page    5 6 7 8 9 10    Next Page
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement