IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 249 Matches Previous Page  |  Next Page
Overcome the Challenges Associated With New Technologies
sponsored by Peer1
VIDEO: This video highlights several challenges IT leaders face when adopting new technologies.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Overcoming Big Data Center Challenges with StruxureWare
sponsored by Schneider Electric
VIDEO: You can have a single pane of glass to control and optimize your business through StruxureWare from Schneider Electric. No more scattered spreadsheets. No more functional silos. Download the video and discover how to reduce capital and operational expenditure by 30%.
Posted: 06 Nov 2014 | Premiered: 12 Jun 2013

Schneider Electric

Red Hat CloudForms: Better Manage your Virtual, Private, and Hybrid Cloud Infrastructures
sponsored by Red Hat
VIDEO: This video covers an open hybrid cloud management solution that will help you better manage you virtual, private, and hybrid cloud infrastructure.
Posted: 20 Jun 2014 | Premiered: 12 Apr 2013

Red Hat

Red Hat Enterprise Linux 7: Perspectives from Industry Analysts
sponsored by Red Hat
WEBCAST: In this video, Rich Fichera from Forrester, Michael Araneta, Phil Carter, and Mayur Sahni from IDC, and Laurent Lachal from Ovum outline requirements for the new era of IT, including mobile, cloud, big data, and social.
Posted: 02 Jul 2015 | Premiered: Jul 2, 2015

Red Hat

Red Hat Enterprise Linux Asks, What If?
sponsored by Red Hat
VIDEO: This video will introduce you to some of the opportunities Red Hat Enterprise Linux can create for your business. Watch and discover what Red Hat can do for you.
Posted: 26 Nov 2013 | Premiered: 26 Nov 2013

Red Hat

Red Hat Storage Server 3: Monitoring Overview
sponsored by Red Hat
WEBCAST: This webcast covers everything you need to know about this monitoring tool that makes it simple for storage administrators to deploy new solutions.
Posted: 14 Oct 2014 | Premiered: Oct 2, 2014

Red Hat

Oracle Database 11g Product Family (Spanish version)
sponsored by Oracle Corporation
WEBCAST: Read this white paper to get an overview of the Oracle Database family of products and learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2.
Posted: 25 Oct 2010 | Premiered: Sep 25, 2009

Oracle Corporation

Oracle's New Powerful and Integrated X86 Systems
sponsored by Oracle Corporation
WEBCAST: View our Launch Webcast to learn more about Oracle's new comprehensive line of powerful x86 systems ranging from blades and rackmount servers to networking systems based on Intel's Xeon 5600 and 7500 processors. 
Posted: 13 Apr 2011 | Premiered: Apr 12, 2011

Oracle Corporation

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation

PacketTrap MSP 6.0
sponsored by Dell Software
TRIAL SOFTWARE: PacketTrap MSP addresses critical challenges service providers face with their customer's networks including: traffic analysis, application and VoIP monitoring, as well as virtualization and private/public cloud management.
Posted: 24 Aug 2011 | Premiered: 23 Aug 2011

Dell Software

PlateSpin Recon: Virtual Capacity Management and Consolidation Planning
sponsored by Novell, Inc.
WEBCAST: Watch this webcast to learn about a new unique workload profiling tool that takes the guess work out of identifying underutilized physical servers and virtual hosts. Learn how to leverage this tool for improved use and longer life of your current hardware.
Posted: 28 Aug 2009 | Premiered: Aug 28, 2009

Novell, Inc.

PODCAST: Defend IT, Delight Users and Launch BSM with Network and User Service Alignment
sponsored by ASG Software Solutions
PODCAST: Find out how implementing user service alignment in your organization allows IT to become a revenue driver, lowers resource costs, maximizes infrastructure utilization, and achieves true BSM.
Posted: 25 Mar 2010 | Premiered: Mar 25, 2010

ASG Software Solutions

Podcast: Enable Enterprise Agility by Managing Feedback Loops
sponsored by Hewlett-Packard Company
PODCAST: This webcast covers the importance of automated feedback loops in the creating a more agile data center.
Posted: 03 Dec 2013 | Premiered: Nov 18, 2013

Hewlett-Packard Company

Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud
sponsored by Intel
PODCAST: Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.
Posted: 12 Oct 2011 | Premiered: Oct 11, 2011

Intel

Podcast: Security across your enterprise mobile devices: What you need to know
sponsored by BlackBerry
PODCAST: This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Podcast: Why SAP ERP As A Platform For Growth?
sponsored by itelligence, Inc.
PODCAST: Midsized organizations are challenged to strike the right balance between reducing costs and making targeted investments for future success.  This session teaches you how to optimize the implementation of your ERP deployment for maximum gain.
Posted: 14 Oct 2010 | Premiered: Oct 14, 2010

itelligence, Inc.

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Powering Tomorrow’s Cloud – An Overview
sponsored by Intel
VIDEOCAST: While a move to the cloud can benefit most enterprises, it is often time consuming and burdensome on your budget. Access this white paper to learn how to utilize technologies to optimize your cloud experience.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.”
Posted: 21 Dec 2010 | Premiered: Feb 23, 2011, 11:00 EST (16:00 GMT)

Oracle Corporation

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company

Reduce the Cost and Complexity of Multi-sourced IT Environments
sponsored by Hewlett-Packard Company
WEBCAST: Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks.
Posted: 27 Jul 2012 | Premiered: May 9, 2012

Hewlett-Packard Company

Reduce Your Desktop TCO Through Client-Side Virtualization
sponsored by Virtual Computer, Inc.
WEBCAST: For most IT organizations, the operational cost of deploying, updating and migrating PCs is the most significant expense associated with the PC life cycle. IDC's Michael Rose outlines some key business considerations that you can apply to reduce your desktop TCO while providing an excellent experience for end-users.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

Virtual Computer, Inc.
151 - 175 of 249 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement