IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and  … 
Definition continues below.
Public Key InfrastructureMultimedia (View All Report Types)
51 - 75 of 260 Matches Previous Page  | Next Page
Discover What's Possible with Dell Solutions
sponsored by Dell, Inc.
VIDEO: Explore this video to learn how Dell is supporting the 2014 Commonwealth Games in Glasgow, Scotland. Discover how the IT teams used Dell solutions in order to plan, execute, and overall make the endeavor that is the Commonwealth games happen. Tune in now to watch and find out more.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

Emerging Expectations of CIO's
sponsored by FrontRange Solutions Inc.
WEBCAST: Consult this on-demand webcast today to learn about the role and expectations of the modern CIO, and find out what skills and competencies are required to be successful in the position.
Posted: 03 Jul 2013 | Premiered: Mar 27, 2013

FrontRange Solutions Inc.

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling Collaboration: How IT Can Empower Users and Maintain Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

End-to-End System Performance: Delivering Continuity and Reliability
sponsored by Dell, Inc.
VIDEO: It's the goal of every IT leader to hit the timelines set forth in planning and executing a project – but for a global sporting event, the pressure is paramount. Learn from those who were in the trenches about the solutions used, to ensure everyone involved had the best experience possible.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Expert MDM Buyers Package:  SearchConsumerization.com's Guide to Product Benefits and Tradeoffs
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This is the third piece in SearchSecurity.com's three-part guide on MDM products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an MDM solution.
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

Delivering Value through Best Practice for Systems Engineering
sponsored by IBM
WEBCAST: View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more.
Posted: 17 Aug 2010 | Premiered: Feb 25, 2010

IBM

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Different Workloads, Different Architectures, One Solution
sponsored by Citrix
WEBCAST: This webcast reviews the two very different architectures required by traditional vs. cloud-era workloads, and how a single cloud management platform can be used to control them both.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Disk Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WEBCAST: This webcast discusses disk backup with data deduplication and the paradigm shift that's going on in data protection overall. Discover common mistakes and pitfalls you can make in your selection process when considering a data protection plan and key takeaways to prevent them.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

ExaGrid Systems, Inc.

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Limited
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Limited

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation

Extending Private Infrastructure with Hybrid Cloud Computing
sponsored by Skytap, Inc.
WEBCAST: The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing.
Posted: 09 Feb 2012 | Premiered: Feb 22, 2012, 01:30 EST (06:30 GMT)

Skytap, Inc.

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM
51 - 75 of 260 Matches Previous Page    1 2 3 4 5 6    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): … A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. The digital certificate contains a public key that is used to encrypt and decrypt messages and digital signatures.
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement