IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
51 - 75 of 246 Matches Previous Page  | Next Page
Creating a Storage Strategy: Get Help From the Pros
sponsored by CommVault Systems, Inc.
WEBCAST: Watch this informative webcast to learn how the State of Colorado sorted out their storage challenges with the help of CommVault and how they can help you create your own storage strategy.
Posted: 30 Apr 2014 | Premiered: Apr 30, 2014

CommVault Systems, Inc.

Credit Union of Colorado Customer Testimonial
sponsored by CommVault Systems, Inc.
WEBCAST: Access this webcast to find out which management solution the Credit Union of Colorado selected to achieve true information management strategy and ensure recoverability and compliance.
Posted: 14 Feb 2014 | Premiered: Feb 14, 2014

CommVault Systems, Inc.

Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

Dell ProSupport Plus: Going to the Ends of the Earth
sponsored by Dell, Inc. and Intel®
WEBCAST: In this brief video, explore how Dell ProSupport Plus goes above and beyond the traditional expectations of customer service with round-the-clock support and proactive monitoring, as well as preventative recommendations.
Posted: 13 Jun 2013 | Premiered: Apr 23, 2013

Dell, Inc. and Intel®

EDM's Digital Mailroom Gets a Makeover
sponsored by Perceptive Software
VIDEO: Find out which industry-leading product helped an information management services provider gain a competitive edge over their peers, and solve the unique automation challenges of the digital mailroom.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

Perceptive Software

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling Collaboration: How IT Can Empower Users and Maintain Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Expert MDM Buyers Package:  SearchConsumerization.com's Guide to Product Benefits and Tradeoffs
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This is the third piece in SearchSecurity.com's three-part guide on MDM products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an MDM solution.
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

Delivering Value through Best Practice for Systems Engineering
sponsored by IBM
WEBCAST: View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more.
Posted: 17 Aug 2010 | Premiered: Feb 25, 2010

IBM

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Disk Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WEBCAST: This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

ExaGrid Systems, Inc.

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Limited
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Limited

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation

Extending Private Infrastructure with Hybrid Cloud Computing
sponsored by Skytap, Inc.
WEBCAST: The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing.
Posted: 09 Feb 2012 | Premiered: Feb 22, 2012, 01:30 EST (06:30 GMT)

Skytap, Inc.
51 - 75 of 246 Matches Previous Page    1 2 3 4 5 6    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement