IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
51 - 75 of 275 Matches Previous Page  | Next Page
Credit Union of Colorado Customer Testimonial
sponsored by CommVault
WEBCAST: Access this webcast to find out which management solution the Credit Union of Colorado selected to achieve true information management strategy and ensure recoverability and compliance.
Posted: 14 Feb 2014 | Premiered: Feb 14, 2014

CommVault

Customer Spotlight: Deploying a Data Protection Program in Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 26 Nov 2014 | Premiered: Nov 5, 2014

Digital Guardian

Data Centers at Your Door: Prefabricated Modules from Schneider Electric
sponsored by Schneider Electric
VIDEO: Prefabricated data centers allow you to do just this. Access this video to learn how prefabricated IT and hydronics modules from Schneider Electric allow you to deliver a flexible and efficient data center built specifically for your needs without any of the guesswork.
Posted: 31 Oct 2014 | Premiered: 12 Jun 2014

Schneider Electric

Day in the life of StruxureWare For Data Centers CIO
sponsored by APC by Schneider Electric
VIDEO: Keep your finger on the pulse on one or many data centres through StrxureWare from Schneider electric. Monitor the facilities and stay updated on the mechanical and electrical utilizations via an easy to navigate dashboard.
Posted: 05 Nov 2014 | Premiered: 03 Jul 2013

APC by Schneider Electric

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Discover What's Possible with Dell Solutions
sponsored by Dell, Inc.
VIDEO: Explore this video to learn how Dell is supporting the 2014 Commonwealth Games in Glasgow, Scotland. Discover how the IT teams used Dell solutions in order to plan, execute, and overall make the endeavor that is the Commonwealth games happen. Tune in now to watch and find out more.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

Don't Let Legacy Infrastructure Be Your Legacy
sponsored by Red Hat
VIDEO: This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Enable an Enterprise-Ready Sync/Share Solution while Maintaining Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

End-to-End System Performance: Delivering Continuity and Reliability
sponsored by Dell, Inc.
VIDEO: It's the goal of every IT leader to hit the timelines set forth in planning and executing a project – but for a global sporting event, the pressure is paramount. Learn from those who were in the trenches about the solutions used, to ensure everyone involved had the best experience possible.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

Delivering Value through Best Practice for Systems Engineering
sponsored by IBM
WEBCAST: View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more.
Posted: 17 Aug 2010 | Premiered: Feb 25, 2010

IBM

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Disk Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WEBCAST: This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

ExaGrid Systems, Inc.

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Limited
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Limited

Driving Innovation and Agility Using Cloud Computing
sponsored by Dell, Inc.
WEBCAST: Access this webcast to explore the effects of the cloud on today's organizations. You'll learn how the role of the CIO has evolved to focus on both innovation and information. You'll also get tips for selecting the right cloud broker and get insight into the rise of Cloud Service Catalogues and Brokers.
Posted: 12 Dec 2014 | Premiered: Dec 10, 2014

Dell, Inc.

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET
51 - 75 of 275 Matches Previous Page    1 2 3 4 5 6    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement