Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy Multimedia (View All Report Types)
1 - 25 of 62 Matches Previous Page  |  Next Page
10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

7 Steps to Leverage DevOps for Tangible Business Benefits
sponsored by CA Technologies.
VIDEO: Tune into the following video to uncover the 7 secrets to DevOps success and learn how leading organizations are leveraging their DevOps strategies to improve overall software quality, decrease time to market, and more.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

A Workstation for Better Radiology Efficiency
sponsored by GE Healthcare
WEBCAST: In this exclusive video, discover an imaging system that enables you to view multiple images quickly, easily, and in a customizable setting.
Posted: 13 Mar 2015 | Premiered: Mar 13, 2015

GE Healthcare

Automate Application Deployments with Serena...in 3 Minutes
sponsored by SERENA Software, Inc.
VIDEO: Access this brief video to discover a release automation tool that helps to replace the manual deployment steps and provide a scalable automation solution designed to handle any application deployments across servers and data centers. Download now to see a demonstration of this tool.
Posted: 10 Apr 2015 | Premiered: 31 Jul 2014

SERENA Software, Inc.

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

DevOps and the Business of Government: Removing the Barriers between Development and Delivery
sponsored by DLT Solutions
WEBCAST: This webinar discusses the principles of DevOps and the ways in which it can enable the government to bring greater value to agencies and the citizens they serve.
Posted: 08 Apr 2015 | Premiered: Jan 28, 2015

DLT Solutions

DevOps Delivers Quality Software Fast with the Right Tools
sponsored by CA Technologies.
VIDEO: Tune into this brief video to learn about the future potential of DevOps and how by utilizing the right technology in conjunction with a DevOps strategy, you can make your business more software-enabled, deliver faster higher-quality software, and facilitate a stronger enterprise overall.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

Discover the Power of Cisco ACI at Qatar University
sponsored by Cisco Systems, Inc.
VIDEO: In this video, learn how Qatar University is improving service delivery times across their network and in the cloud for a rapidly growing student population, with assistance from Cisco's ACI.
Posted: 03 Apr 2015 | Premiered: 26 Jan 2015

Cisco Systems, Inc.

Esker Accounts Payable Automation Customer Testimonials
sponsored by Esker Inc.
VIDEO: Watch this video to see what Esker Customers have to say about Esker's Accounts Payable Automation Software as a Service, invoice approval workflow and touchless processing capabilities.
Posted: 28 Jan 2015 | Premiered: 06 Dec 2013

Esker Inc.

Five Deadly Sins of Analytical Product Development
sponsored by Birst
WEBCAST: Kevin Smith, the Vice President of Embedded Solutions at Birst, is here to fill you in on the basics for avoiding drawbacks that hinder the success of your analytical product. Watch, and learn to escape 5 pitfalls that jeopardize your product's outcome.
Posted: 25 Mar 2015 | Premiered: Feb 27, 2015

Birst

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

How Do You Select ERP for Defense Manufacturing? – Podcast
sponsored by IFS
PODCAST: Find out how the unique characteristics of defense manufacturing operations affect their needs in the area of enterprise resource planning (ERP).
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

IFS

Hybrid Service Management From a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: Access this brief video to learn how you can manage your transactions from a single platform, on-premise or in the cloud. Tune in to discover how this program helps thousands of organizations in fields like IT, finance, HR and more efficiently manage their businesses processes.
Posted: 17 Apr 2015 | Premiered: 13 Jan 2015

FrontRange Solutions Inc.

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

How user experience is a business differentiator
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited
1 - 25 of 62 Matches Previous Page    1 2 3    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement