IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
26 - 50 of 450 Matches Previous Page  |  Next Page
Applications for 28 AWG Twisted Pair Cabling Systems
sponsored by Panduit
WEBCAST: In this webcast, Thomas Bond, Senior Product Manager, Panduit, explains space saving techniques for your telecommunications room and the key benefits of the smaller 28 AWG cabling.
Posted: 22 Sep 2017 | Premiered: Feb 16, 2016

Panduit

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

All-Flash Storage Boosts Telecom's Performance Guarantees
sponsored by NetApp
VIDEO: Learn why matching the performance of compute, network and storage to the workload needs of enterprise customers is key.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

As Your Business Grows, How Can You Shrink Your Carbon Footprint?
sponsored by Dimension Data
WEBCAST: This informative blog post explores how you can transform your business model with the cloud in order to both reduce IT costs and lower your carbon footprint. Download now to uncover other technologies you can use to reduce your impact on the planet.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015

Dimension Data

Assessment Tool: Understanding the Economics of Cyberdefense
sponsored by Juniper Networks, Inc.
WEBCAST: How should you balance the four spend areas in cyberdefense? Calculate investment levels with RAND's interactive tool.
Posted: 08 Sep 2015 | Premiered: Sep 8, 2015

TOPICS:  IT Management
Juniper Networks, Inc.

Australia Department of Prime Minister & Cabinet on G20 Tech
sponsored by Dimension Data
VIDEO: In a world first, the 2014 G20 used cloud for secure networking and virtual desktop. Learn how a new benchmark was set.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

TOPICS:  IT Management
Dimension Data

Avoid Gridlock With a Flexible Infrastructure
sponsored by IBM
VIDEO: Ensure your data center runs smoothly and supports the growth of your business with a software-defined storage solution.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

B2B Integration for Healthcare: Don't Worry. Be Ready.
sponsored by IBM
WEBCAST: Healthcare transformations are increasing B2B integration complexity. Prepare your organization with IBM architecture.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Banking - Analytics Drive Banking Innovations, Better Customer Service
sponsored by Hewlett-Packard Enterprise
VIDEO: See how the use of real-time data is creating new opportunities for banking enterprises—and their customers.
Posted: 17 Oct 2016 | Premiered: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Best Practices for Securing SaaS with CASB
sponsored by McAfee, Inc.
VIDEO: Listen to Securosis and McAfee discuss the challenges in cloud security and the benefits of agile security solutions.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Best Practices in Application Performance Management
sponsored by CA Technologies.
PODCAST: In this podcast, discover what is meant by an end-to-end approach to Application Performance Management and, from the perspective of the IT organization, why it's so critical.
Posted: 31 Mar 2008 | Premiered: Mar 31, 2008, 09:00 EDT (13:00 GMT)

CA Technologies.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Branch, Cloud and Software Defined with Riverbend
sponsored by Hewlett-Packard Enterprise
VIDEO: David Groves explains how the app performance company is growing its services business in partnership with HPE.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Brian Madden Explores VDI and Hyperconverged Infrastructures
sponsored by SimpliVity
VIDEO: In this video, independent analyst and blogger Brian Madden discusses hyper-convergence and VDI with Sammie Ginger, a principal VDI engineer at SimpliVity. Watch now and learn how a hyperconverged infrastructure solution can enable your enterprise to deliver more virtual desktops on less hardware without sacrificing performance or reliability.
Posted: 19 Feb 2016 | Premiered: 19 Feb 2016

SimpliVity

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build a Lean Cloud Based Security Operations Center
sponsored by Splunk
WEBCAST: Discover how Travis Perkins protected the organization while moving an on-premise legacy SOC to a lean SOC in the cloud.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Build a Modern Data Protection Strategy Based on Hyperconvergence
sponsored by SimpliVity
WEBCAST: In this webcast, Western Regional Director of Solution Architects, Jay Patel, offers information on a system that takes less than 60 seconds to improve how you back-up and restore your data.Download now to hear specific case studies and their recovery stories, as well as a demo of this restoration back up system.
Posted: 19 Jul 2016 | Premiered: May 30, 2016

SimpliVity

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat
26 - 50 of 450 Matches Previous Page    1 2 3 4 5    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement