Gartner Webinars
Expert insights and strategies to address your priorities and solve your most pressing challenges.
Information Technology
The confidential half of the asymmetric key pair used in public-key cryptography. Unlike the “secret key” used in symmetric-key cryptography — a single key known by both the sender and the receiver — a private key is known only by the recipient. See public-key cryptography and secret-key cryptography.
Join your peers for the unveiling of the latest insights at Gartner conferences.
Expert insights and strategies to address your priorities and solve your most pressing challenges.