IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
151 - 175 of 252 Matches Previous Page  |  Next Page
Now IT Can Update from Anywhere!
sponsored by Dell, Inc. and Intel®
VIDEO: Dell has created a way for IT personnel to update from anywhere, at any time, so they don't have to be chained to their work desk. In fact, you won't believe where some IT pros are updating from – watch this video to find out!
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Dell, Inc. and Intel®

On Demand Cloud Platform™ Caters to Developers
sponsored by Peer1
VIDEO: View this video to find out how developers can have control over their own environments with a specific type of cloud platform.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Overcome the Challenges Associated With New Technologies
sponsored by Peer1
VIDEO: This video highlights several challenges IT leaders face when adopting new technologies.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Overcoming Big Data Center Challenges with StruxureWare
sponsored by Schneider Electric
VIDEO: You can have a single pane of glass to control and optimize your business through StruxureWare from Schneider Electric. No more scattered spreadsheets. No more functional silos. Download the video and discover how to reduce capital and operational expenditure by 30%.
Posted: 06 Nov 2014 | Premiered: 12 Jun 2013

Schneider Electric

Podcast: Extending DR to the Cloud for Increased Performance
sponsored by Avnet
PODCAST: Access this webcast to discover how implementing a cloud-based DR as a service model can eliminate unnecessary secondary sites, servers, and storage while providing more agility and faster implementation.
Posted: 15 Jul 2015 | Premiered: Jul 6, 2015

Avnet

Nimsoft Monitor for Microsoft Applications
sponsored by Nimsoft, Inc.
WEBCAST: Discover how a US based cloud computing and managed service provider benefited from proactively managing their applications with a next-generation strategy. Find out how this innovative approach allowed them to improve efficiency by 15-20%.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

One-Stop Shop: Best Practices to Streamline your Service Desk
sponsored by Nimsoft, Inc.
WEBCAST: Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator of knowledge and the service catalog, you need to provide excellent service and quick response times. Watch this webcast and discover the most current recommendations for service delivery and management best practices.
Posted: 05 Jan 2012 | Premiered: Sep 22, 2011

Nimsoft, Inc.

Online Trial: Rational System Architect
sponsored by IBM
SOFTWARE DOWNLOAD: Try IBM® Rational® System Architect® V11.3, which enables business managers and IT professionals to plan, model, and execute changes to improve their business strategy and process as well as the IT systems and infrastructure that support them, enabling successful enterprise planning and transformation.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

Oracle Advanced Customer Services: Solution Support Center
sponsored by Oracle Corporation
WEBCAST: The Oracle Solution Support Center, Oracle's most comprehensive Advanced Customer Service, is the best way to protect mission-critical operations and drive business success.
Posted: 18 Feb 2008 | Premiered: Feb 18, 2008

Oracle Corporation

Oracle Database 11g Product Family (Spanish version)
sponsored by Oracle Corporation
WEBCAST: Read this white paper to get an overview of the Oracle Database family of products and learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2.
Posted: 25 Oct 2010 | Premiered: Sep 25, 2009

Oracle Corporation

Oracle's New Powerful and Integrated X86 Systems
sponsored by Oracle Corporation
WEBCAST: View our Launch Webcast to learn more about Oracle's new comprehensive line of powerful x86 systems ranging from blades and rackmount servers to networking systems based on Intel's Xeon 5600 and 7500 processors. 
Posted: 13 Apr 2011 | Premiered: Apr 12, 2011

Oracle Corporation

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation

PacketTrap MSP 6.0
sponsored by Dell Software
TRIAL SOFTWARE: PacketTrap MSP addresses critical challenges service providers face with their customer's networks including: traffic analysis, application and VoIP monitoring, as well as virtualization and private/public cloud management.
Posted: 24 Aug 2011 | Premiered: 23 Aug 2011

Dell Software

PlateSpin Recon: Virtual Capacity Management and Consolidation Planning
sponsored by Novell, Inc.
WEBCAST: Watch this webcast to learn about a new unique workload profiling tool that takes the guess work out of identifying underutilized physical servers and virtual hosts. Learn how to leverage this tool for improved use and longer life of your current hardware.
Posted: 28 Aug 2009 | Premiered: Aug 28, 2009

Novell, Inc.

PODCAST: Defend IT, Delight Users and Launch BSM with Network and User Service Alignment
sponsored by ASG Software Solutions
PODCAST: Find out how implementing user service alignment in your organization allows IT to become a revenue driver, lowers resource costs, maximizes infrastructure utilization, and achieves true BSM.
Posted: 25 Mar 2010 | Premiered: Mar 25, 2010

ASG Software Solutions

Podcast: Enable Enterprise Agility by Managing Feedback Loops
sponsored by Hewlett-Packard Company
PODCAST: This webcast covers the importance of automated feedback loops in the creating a more agile data center.
Posted: 03 Dec 2013 | Premiered: Nov 18, 2013

Hewlett-Packard Company

Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud
sponsored by Intel
PODCAST: Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.
Posted: 12 Oct 2011 | Premiered: Oct 11, 2011

Intel

Podcast: Security across your enterprise mobile devices: What you need to know
sponsored by BlackBerry
PODCAST: This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Podcast: Why SAP ERP As A Platform For Growth?
sponsored by itelligence, Inc.
PODCAST: Midsized organizations are challenged to strike the right balance between reducing costs and making targeted investments for future success.  This session teaches you how to optimize the implementation of your ERP deployment for maximum gain.
Posted: 14 Oct 2010 | Premiered: Oct 14, 2010

itelligence, Inc.

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Powering Tomorrow’s Cloud – An Overview
sponsored by Intel
VIDEOCAST: While a move to the cloud can benefit most enterprises, it is often time consuming and burdensome on your budget. Access this white paper to learn how to utilize technologies to optimize your cloud experience.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.”
Posted: 21 Dec 2010 | Premiered: Feb 23, 2011, 11:00 EST (16:00 GMT)

Oracle Corporation

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM
151 - 175 of 252 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement