IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
151 - 175 of 219 Matches Previous Page  | Next Page
Rackspace and NetIQ - A Success Story
sponsored by NetIQ
WEBCAST: This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2013

NetIQ

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

Red Hat Enterprise Linux Asks, What If?
sponsored by Red Hat
VIDEO: This video will introduce you to some of the opportunities Red Hat Enterprise Linux can create for your business. Watch and discover what Red Hat can do for you.
Posted: 26 Nov 2013 | Premiered: 26 Nov 2013

Red Hat

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Secure DNS Prevents DDoS Attacks
sponsored by Neustar®
WEBCAST: This informative webcast discusses why DNS has become a favorite target for DDoS attacks and how a hardened DNS combined with cloud-based protection can provide the shield your organization needs.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Security and Compliance Best Practices for SaaS Providers
sponsored by CloudPassage
WEBCAST: This webcast reviews the latest trends in software architectures and delivery models, along with the issues software-as-a-service (SaaS) providers must take into consideration when developing security measures.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

CloudPassage

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company

Reduce the Cost and Complexity of Multi-sourced IT Environments
sponsored by Hewlett-Packard Company
WEBCAST: Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks.
Posted: 27 Jul 2012 | Premiered: May 9, 2012

Hewlett-Packard Company

Reduce Your Desktop TCO Through Client-Side Virtualization
sponsored by Virtual Computer, Inc.
WEBCAST: For most IT organizations, the operational cost of deploying, updating and migrating PCs is the most significant expense associated with the PC life cycle. IDC's Michael Rose outlines some key business considerations that you can apply to reduce your desktop TCO while providing an excellent experience for end-users.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

Virtual Computer, Inc.

Reducing IT TCO with Effective Endpoint Security Management
sponsored by Lumension
PODCAST: This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Refreshing IT Infrastructure with the Xeon Processor 5500 Series
sponsored by Intel Corporation
VIDEO: In this Videocast, learn what key points an organization looks at when thinking about a technology refresh. Gain insight into the value proposition of refreshing IT infrastructure with the Xeon Processor 5500 series and how it is essential for meeting performance, reliability and flexibility requirements.
Posted: 21 May 2009 | Premiered: 11 May 2009

Intel Corporation

Refreshing IT Infrastructure with the Xeon Processor 5500 Series
sponsored by Intel Corporation
PODCAST: In this Podcast, learn what key points an organization looks at when thinking about a technology refresh. Gain insight into the value proposition of refreshing IT infrastructure with the Xeon Processor 5500 series and how it is essential for meeting performance, reliability and flexibility requirements
Posted: 21 May 2009 | Premiered: May 11, 2009

Intel Corporation

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Service Provisioning and Configuration – Path to the Cloud with Ben Newton and David Williams
sponsored by BMC-Accenture
PODCAST: When you look at moving to the cloud and consider all the hype that’s out there, it can be difficult to know where to start. The smart place to begin is with automation. This resource explores the hype on IT automation. Learn about service provisioning, configuration, and discover a path to the cloud.
Posted: 13 Jan 2012 | Premiered: Jan 13, 2012

BMC-Accenture

Service2Media Accelerates its time to market with HP Cloud Solutions (2 min video):
sponsored by HP
VIDEOCAST: This video discusses how one company leveraged advanced cloud solutions to significantly accelerate its time to market, increasing its ROI. Learn how these new platforms can enable you to focus on your core business offering, allowing you to improve performance and efficiency.
Posted: 06 Jan 2012 | Premiered: Jan 6, 2012

HP

Seven Strategies for Effective Desktop Management
sponsored by WebEx Communications, Inc.
WEBCAST: Remote and local desktop support is an increasingly difficult and expensive task for IT staffs. Listen to this Webcast to gain seven strategies for effective desktop management so your organization can immediately manage, protect and secure its PC assets
Posted: 01 Mar 2007 | Premiered: Feb 27, 2007

WebEx Communications, Inc.

Shutting the Door on Data Theft
sponsored by Websense, Inc.
WEBCAST: Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.
Posted: 15 Sep 2011 | Premiered: Sep 15, 2011

Websense, Inc.

SMART Guidance for Exchange Migrations
sponsored by BinaryTree
WEBCAST: Microsoft Exchange Server 2013 has several new features, this webinar reviews some of these and walks through the migration process from Exchange Server 2010 or earlier.
Posted: 03 Oct 2013 | Premiered: Sep 26, 2013

BinaryTree
151 - 175 of 219 Matches Previous Page    5 6 7 8 9    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement