IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 329 Matches Previous Page  |  Next Page
IT Best Practices for Managing (or Inheriting!) Public Cloud Workloads
sponsored by Embotics
WEBCAST: This webinar explores what you can learn from organizations who have encountered pain points with managing public cloud workloads. Download now to find out how to overcome them and how best to optimize for the hybrid cloud of the future.
Posted: 25 May 2016 | Premiered: May 25, 2016

Embotics

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

IT without Boundaries: Achieving Stability and Agility
sponsored by Red Hat
VIDEO: View this video to learn about a company that can help businesses achieve an IT environment without boundaries. Watch now and see how you can enable powerful agility all while aligning the needs of both the business and IT.
Posted: 14 Apr 2016 | Premiered: 14 Apr 2016

Red Hat

ITSM Drives Digital Transformation at the NHS Education for Scotland
sponsored by ServiceNow
VIDEO: In this brief video, Christopher Wroath, Interim Director of Digital Transformation, explains why not changing to a service management culture is not an option at the NHS Education for Scotland. Uncover how this enables them to demonstrate a properly integrated service-led experience for trainees.
Posted: 02 Mar 2016 | Premiered: 05 Nov 2015

ServiceNow

Keep Data Safe, Whether at Rest or in Motion
sponsored by Riverbed Technology, Inc.
WEBCAST: Learn how the right technology ensures data remains safe when transported to enterprise data centers.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

Leveraging the Cloud to Gain Operational Intelligence
sponsored by Splunk
VIDEO: Explore how you can gain operational intelligence and centralized visibility across cloud, hybrid, and on-premises environments by leveraging Software as a Service (SaaS). Learn how this cloud computing strategy can increase app uptime and performance, and more.
Posted: 20 Apr 2016 | Premiered: 20 Apr 2016

Splunk

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This presentation shows you how to simplify your network traffic monitoring and get rid of your existing Sandbox appliance. Protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

LOGICcards Overview: Delivering Real-time Insights to MSPs and ITSPs
sponsored by LogicNow
VIDEO: In this brief video, learn more on how LOGICcards can allow MSPs and IT professionals to create predictive observations that are translated into proactive actions you can take to make your customers' IT systems work better and more efficiently.
Posted: 11 Apr 2016 | Premiered: 11 Apr 2016

LogicNow

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

IBM Tivoli Live Monitoring Services Demo
sponsored by IBM
PRODUCT DEMO: Watch this demo to see how Tivoli Live can help you manage the health and performance of your data center's resources—including operating systems, virtualized servers, middleware and applications.
Posted: 20 May 2011 | Premiered: 20 May 2011

IBM

Increase Utilization, Decrease Energy Costs With Data Center Virtualization
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores answers to some of the key questions around getting started with virtualization. It addresses cost savings, weighing benefits vs. risks, transitioning from older platforms to new ones, best practices and more.
Posted: 21 May 2008 | Premiered: Jun 19, 2008, 12:00 EDT (16:00 GMT)

Hewlett Packard Enterprise

Increase your Citrix XenDesktop monitoring capabilities using HP Operations Management Software
sponsored by Citrix Ready and ComTrade
WEBCAST: Join us to learn how ComTrade's Smart Plug-in for Citrix (Citrix SPI) helps you measure, monitor and manage XenDesktop and gives you an end-to-end overview from within the HP Operations Manager and HP BSM.
Posted: 06 Sep 2012 | Premiered: Sep 26, 2012, 13:00 EDT (17:00 GMT)

Citrix Ready and ComTrade

Innovators Demo Part II - Your Collaboration Destiny Continues
sponsored by IBM
PRODUCT DEMO: Embark on this interactive journey with the Innovators agents. They clearly show you how to think differently, act differently, communicate and collaborate in new ways - even while on the move - making you and your team more productive and connected.
Posted: 18 Jun 2010 | Premiered: 17 Jun 2010

IBM

Intel Cloud Builders Reference Architecture: Canonical and Cloud Computing Interoperability
sponsored by Intel
VIDEOCAST: Many businesses are looking to create a cloud solution with interoperability between clouds, but it’s no easy task. This brief video explores common challenges associated with building interoperable private clouds and introduces advanced solutions you can leverage to overcome them.
Posted: 01 Mar 2012 | Premiered: Oct 28, 2011

Intel

Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware
sponsored by Intel
VIDEOCAST: While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected.
Posted: 01 Mar 2012 | Premiered: Dec 20, 2011

Intel

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Intel® Chip Chat
sponsored by Intel
PODCAST: Intel® Chip Chat is a recurring podcast series of informal, one-on-one interviews with some of the brightest minds in the industry. It strives to bring listeners closer to the innovations and inspirations of the men and women shaping the future of computing, and in the process share a little bit about the technologists themselves.
Posted: 13 Dec 2011 | Premiered: Dec 13, 2011

Intel

Interactive Tool: Business Analytics Maturity Assessment
sponsored by SAS
WEBCAST: Discover the strengths and weaknesses of your organization's analytics with this five minute test.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Interactive Tool: Find the Best Processor for Your Workload
sponsored by Intel and IBM
WEBCAST: Find out the best processor for your organization by entering your workload requirements into this tool.
Posted: 06 Nov 2015 | Premiered: Nov 6, 2015

TOPICS:  IT Management
Intel and IBM

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

Linux Without Limits: An Introductory Video
sponsored by IBM
VIDEO: In this brief video, you will discover a suite of hardware, software, services, and solutions that will empower you to unleash the full potential of Linux for your business. Tune in to deliver the flexibility and agility your organization craves with this trusted enterprise system, and scale out to 8,000 virtual servers in a single system.
Posted: 24 Feb 2016 | Premiered: 17 Aug 2015

IBM
151 - 175 of 329 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement