Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy Multimedia (View All Report Types)
1 - 25 of 93 Matches Previous Page  |  Next Page
A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Case Study: Clear Up Compliance Concerns with Software-Asset Management
sponsored by CDW Corporation
VIDEO: This exclusive video case study details how a software firm used software-asset management to clear up their compliance concerns.
Posted: 28 Aug 2014 | Premiered: 16 Apr 2012

CDW Corporation

Case Study: How to Deal with a Self-Audit Request
sponsored by CDW Corporation
VIDEO: This video case study covers how one hospital group dealt with a self-audit request when they did not know if their software licensing was compliant.
Posted: 21 Jul 2014 | Premiered: 17 Apr 2014

CDW Corporation

Case Study: How to Negotiate a New Software License Contract
sponsored by CDW Corporation
VIDEO: This exclusive video explores the solution one company turned to, to negotiate their new software license contract.
Posted: 29 Aug 2014 | Premiered: 21 Jun 2012

CDW Corporation

Case study: K2 Software Improves the Invoicing Process
sponsored by K2
VIDEO: This video case study explains how a leading provider of portcentric logistics improved the quality of its invoicing process and saved £25,000 by deploying K2 software. Access it now to learn how and find out what it can do for you.
Posted: 24 Nov 2014 | Premiered: 18 Jan 2013

K2

CDW Software Solutions Solve Problems
sponsored by CDW Corporation
VIDEO: Access this video to learn how you can build a solid strategy for software purchases now and into the future by partnering with CDW. You'll get insight into how you validate your software selections and ensure that your current and future investments deliver optimal benefits.
Posted: 22 Oct 2014 | Premiered: 20 Oct 2014

CDW Corporation

CDW’s Software Experts Achieve Results
sponsored by CDW Corporation
VIDEO: Access this video to learn how you can gain access everything you need to assess, validate, deploy, and manage software at your organization. Watch now to learn how you can simplify your software management by leveraging the expertise of specialists to offer best-in-class recommendations.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

CDW Corporation

Deploy DevOps in Your Traditional Environment with Configuration Management Processes
sponsored by Red Hat
WEBCAST: Many companies are implementing new tactics and methodologies to help reduce their time to market and improve overall software quality. View this webcast now to learn how to implement DevOps for Java EE applications in a traditional, non-PaaS environment.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

DevOps and PaaS: The Perfect Combination to Develop and Deploy Java EE Applications
sponsored by Red Hat
WEBCAST: All too often development teams are left disjointed and unorganized due to far too many initiatives. View this webcast now to discover how to implement DevOps for Java EE applications in a platform-as-a-service (PaaS) environment.
Posted: 02 Oct 2014 | Premiered: Oct 2, 2014

Red Hat

Don't let legacy infrastructure be your legacy
sponsored by Insight and Red Hat
VIDEO: This video explains the advantages of using open, secure infrastructure software to upgrade your legacy infrastructure, including more uptime and seamless app migration. Watch and learn why 90% of Fortune 500 companies rely on infrastructure software as the foundation for their IT infrastructure.
Posted: 19 Dec 2014 | Premiered: 23 May 2014

Insight and Red Hat

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

Adobe Flash Builder 4
sponsored by Adobe Systems, Inc.
SOFTWARE DOWNLOAD: Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.
Posted: 04 Jan 2011 | Premiered: 04 Jan 2011

Adobe Systems, Inc.

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Demo: Service lifecycle management in action
sponsored by IBM
PRODUCT DEMO: Organizations moving towards Service-Oriented Architecture must manage their services from development to deployment. This demo shows how Rational Team Concert, Rational Asset Manager, and WebSphere Service Registry and Repository provide a comprehensive, integrated solution for organizations looking to realize SOA.
Posted: 06 Oct 2009 | Premiered: 06 Oct 2009

IBM

Docmosis V2.0
sponsored by Docmosis
TRIAL SOFTWARE: Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.
Posted: 17 Jun 2009 | Premiered: 15 Jun 2009

Docmosis
1 - 25 of 93 Matches Previous Page    1 2 3 4    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement