IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
26 - 50 of 406 Matches Previous Page  |  Next Page
As Your Business Grows, How Can You Shrink Your Carbon Footprint?
sponsored by Dimension Data
WEBCAST: This informative blog post explores how you can transform your business model with the cloud in order to both reduce IT costs and lower your carbon footprint. Download now to uncover other technologies you can use to reduce your impact on the planet.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015

Dimension Data

Australia Department of Prime Minister & Cabinet on G20 Tech
sponsored by Dimension Data
VIDEO: In a world first, the 2014 G20 used cloud for secure networking and virtual desktop. Learn how a new benchmark was set.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

TOPICS:  IT Management
Dimension Data

Automated Test Data Creation: An IT Manager's Review
sponsored by CA Technologies
VIDEO: Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.
Posted: 09 Sep 2016 | Premiered: 29 Feb 2016

CA Technologies

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
PODCAST: Tune into this podcast to discover how you can avoid 3 common pitfalls for DCIM software implementation. Access now to gain practical guidance for how to ensure the success of your DCIM strategy.
Posted: 09 May 2016 | Premiered: May 9, 2016

Schneider Electric

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Beating Back Malicious Mobile Apps
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

IBM

Benefits of an Application Adaptive Data Infrastructure
sponsored by DataCore Software Corporation
WEBCAST: A parallel I/O storage software can handle the different levels of performance, flexibility and availability required by dynamic applications. Access now to learn about one software solution that can handle multiple vendors and reduce cost by 75%.
Posted: 09 Aug 2016 | Premiered: Aug 8, 2016

DataCore Software Corporation

Bimodal IT Best Practices
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Bimodal IT is an approach in which a company operates two tiers of IT management -- one focused on "keeping the lights on" and the other focused on experimentation and speed to drive business goals. This Classroom explores emerging best practices around bimodal IT.
Posted: 17 Feb 2016 | Premiered: 16 Feb 2016

TOPICS:  IT Management
SearchCIO.com

Bimodal IT: A New Philosophy for IT Service Delivery pt 1
sponsored by VMware
WEBCAST: In this webcast, Brien Posey, freelance technical writer and 14-time Microsoft MVP award winner, breaks down the advantages and disadvantages of implementing Bimodal IT. Tune in to consider the benefits of Bimodal IT, and see if it's the right choice for your data center.
Posted: 08 Jul 2016 | Premiered: Jan 1, 2016

VMware

Bimodal IT: A New Philosophy for IT Service Delivery pt 3
sponsored by VMware
WEBCAST: In this feature webcast, Brien Posey, freelance technical writer and 14-time Microsoft MVP award winner, offers 3 best practices for implementing Bimodal IT. Tune into this webcast to gain expert insight on choosing the solution that will help you overcome the challenges that come along with Bimodal IT.
Posted: 12 Jul 2016 | Premiered: Jan 1, 2016

VMware

Bimodal IT: A New Philosophy for IT Service Delivery – Part 2
sponsored by VMware
WEBCAST: Converting your data center design to a bimodal IT system can move you closer to stability and agility while also converging traditional and modern IT services. In this webcast, Brien Posey, freelance technical writer and speaker and 14-time Microsoft MVP, offers guidance for those considering a bimodal IT approach.
Posted: 11 Jul 2016 | Premiered: Jan 1, 2016

VMware

Bridging the Gap between Facilities and IT with StruxureWare
sponsored by Schneider Electric
VIDEO: In this video, you will learn how to keep your finger on the pulse on one or many data centers with Schneider Electric. Tune in now to discover how to monitor your facilities and stay updated on the mechanical and electrical utilizations of your system.
Posted: 05 Nov 2014 | Premiered: 03 Jul 2013

Schneider Electric

Build a Modern Data Protection Strategy Based on Hyperconvergence
sponsored by SimpliVity
WEBCAST: In this webcast, Western Regional Director of Solution Architects, Jay Patel, offers information on a system that takes less than 60 seconds to improve how you back-up and restore your data.Download now to hear specific case studies and their recovery stories, as well as a demo of this restoration back up system.
Posted: 19 Jul 2016 | Premiered: May 30, 2016

SimpliVity

Building a Solid Foundation for Service Management
sponsored by ServiceNow
VIDEO: In this webcast, Andy Garrett, Head of IT Service Development at Travis Perkins Plc, explains how they modernized their ITSM strategy. Tune in to discover the key factors that set them up for success.
Posted: 01 Mar 2016 | Premiered: 24 Nov 2015

ServiceNow

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Assessment Tool: Understanding the Economics of Cyberdefense
sponsored by Juniper Networks, Inc.
WEBCAST: How should you balance the four spend areas in cyberdefense? Calculate investment levels with RAND's interactive tool.
Posted: 08 Sep 2015 | Premiered: Sep 8, 2015

TOPICS:  IT Management
Juniper Networks, Inc.

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Best Practices in Application Performance Management
sponsored by CA Technologies.
PODCAST: In this podcast, discover what is meant by an end-to-end approach to Application Performance Management and, from the perspective of the IT organization, why it's so critical.
Posted: 31 Mar 2008 | Premiered: Mar 31, 2008, 09:00 EDT (13:00 GMT)

CA Technologies.

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Brian Madden Explores VDI and Hyperconverged Infrastructures
sponsored by SimpliVity
VIDEO: In this video, independent analyst and blogger Brian Madden discusses hyper-convergence and VDI with Sammie Ginger, a principal VDI engineer at SimpliVity. Watch now and learn how a hyperconverged infrastructure solution can enable your enterprise to deliver more virtual desktops on less hardware without sacrificing performance or reliability.
Posted: 19 Feb 2016 | Premiered: 19 Feb 2016

SimpliVity

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat
26 - 50 of 406 Matches Previous Page    1 2 3 4 5    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement