IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

Public Key Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: P K I, Public-key Infrastructure, PKI Security, PKI
DEFINITION: A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and  … 
Definition continues below.
Public Key Infrastructure Multimedia (View All Report Types)
76 - 100 of 310 Matches Previous Page  |  Next Page
Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: This video teaches you about a solution with micro incident response capability that will protect your network 24/7, 365 days per year. Access now to stop simple breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Eliminate the Challenges of Monitoring and Managing an Efficient Data Center
sponsored by IBM
VIDEO: Tune into this video to strategize your accommodation of emerging workload types caused by the disruption of cloud and mobility, and determine if integrated managed services will reduce costly time spent managing your data center infrastructure.
Posted: 11 Nov 2015 | Premiered: 06 Jan 2014

IBM

Embracing BYOD with Mobile Device Management
sponsored by IBM MaaS360
VIDEO: In this brief video, you will discover how to offer your end-users simple BYOD enrollment for their personal devices with an MDM platform, as well as hand your IT full control of mobile devices running on iOS and Android. Tune in to secure your organization's data with compliant endpoint access.
Posted: 03 Mar 2016 | Premiered: 03 Mar 2016

IBM MaaS360

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014

SearchMobileComputing

Everything as a Service: Improve Workflow in All Departments
sponsored by ServiceNow
VIDEO: In this brief video, learn how you can leverage Everything as a Service to enable automation and efficiency across your organization. Discover how to deliver everything from employee onboarding, to invoicing, to cloud provisioning as a service.
Posted: 23 Feb 2016 | Premiered: 29 Apr 2015

ServiceNow

Extending ITSM Value Beyond IT with PPM
sponsored by ServiceNow
VIDEO: In this brief video, Katie Irvine, Senior Operations Analyst at Standard Life, explains how they extended the value of their ITSM platform to support Project and Portfolio Management. Tune in to learn how you can achieve similar benefits.
Posted: 26 Feb 2016 | Premiered: 26 Nov 2015

ServiceNow

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Don't Get Lost in Multi-Vendor Support Chaos
sponsored by Hewlett-Packard Enterprise
VIDEO: This video features a case study of one company that moved on from to a single vendor to end the chaos in their support environment.
Posted: 21 Jan 2014 | Premiered: 08 Jan 2014

Hewlett-Packard Enterprise

Driving Innovation and Agility Using Cloud Computing
sponsored by Dell, Inc.
WEBCAST: Access this webcast to explore the effects of the cloud on today's organizations. You'll learn how the role of the CIO has evolved to focus on both innovation and information. You'll also get tips for selecting the right cloud broker and get insight into the rise of Cloud Service Catalogues and Brokers.
Posted: 12 Dec 2014 | Premiered: Dec 10, 2014

Dell, Inc.

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Enhancing End-to-End Cloud Security: Part 3
sponsored by Intel Security
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

Intel Security

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Essential Guide: On-Premises vs. Hosted Cloud UC Comparison
sponsored by Dimension Data
WEBCAST: Some businesses are replacing on-premises UC solutions with cloud-based options. Learn how the two compare.
Posted: 26 Feb 2015 | Premiered: Feb 26, 2015

TOPICS:  IT Management
Dimension Data

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation

Extending Private Infrastructure with Hybrid Cloud Computing
sponsored by Skytap, Inc.
WEBCAST: The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing.
Posted: 09 Feb 2012 | Premiered: Feb 22, 2012, 01:30 EST (06:30 GMT)

Skytap, Inc.

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

From Batch Processing to Workload Automation
sponsored by BMC Software, Inc.
PODCAST: Download this podcast to find out how IT workload automation can help you improve the efficiency of your overall operations and help your business deliver new applications more quickly.
Posted: 26 Jan 2010 | Premiered: Jan 26, 2010

BMC Software, Inc.

Future Proofing your HP Business Critical Infrastructure
sponsored by Forsythe
WEBCAST: In this webcast, get a firsthand look into a virtual platform that is designed to meet your current and future IT demands. Learn how to right-size system capacity and improve workload scalability. Discover industry best practices to increase agility of applications and systems.
Posted: 19 Oct 2009 | Premiered: Oct 19, 2009

Forsythe

Gain Instant Protection with Powerful VM Backup Software
sponsored by Commvault
WEBCAST: If you're looking to backup your virtualised datacentre and VMs, check out this webcast from CommVault, and learn how one of the leading dental service organizations in the US found a way to backup and manage their more than 400 virtual machines by choosing the right backup software.
Posted: 08 May 2014 | Premiered: Sep 3, 2013

Commvault

Gaining a Key Competitive Edge in the MSP Marketplace
sponsored by Autotask Corporation
VIDEO: This brief video describes a product that will bring accountability to your organization.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation
76 - 100 of 310 Matches Previous Page    2 3 4 5 6 7    Next Page
 
PUBLIC KEY INFRASTRUCTURE DEFINITION (continued): …  directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on.The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret … 
Public Key Infrastructure definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement