Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy Multimedia (View All Report Types)
76 - 89 of 89 Matches Previous Page  |  Next Page
The Best and Worst Antivirus Platforms Compared
sponsored by Check Point Software Technologies Ltd.
WEBCAST: In this webcast, watch as top anti-malware platforms go head to head and see who has the best catch rates of known and unknown attacks and who lets the most slip through the cracks. View now to learn more.
Posted: 03 Mar 2015 | Premiered: Aug 25, 2014

Check Point Software Technologies Ltd.

The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST: In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014

Veracode, Inc.

Transforming Big Data into Insights with IBM System z: An Independent Consultant’s Perspective
sponsored by IBM
WEBCAST: Join us as Mike Ferguson, an independent consultant and analyst, reviews business and technical requirements for organizations embarking on big data and business analytics solutions. He will also discuss key IBM solutions for System z.
Posted: 22 Apr 2014 | Premiered: Jun 24, 2014

IBM

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Use the Cloud as Fuel for Business Growth
sponsored by IBM
WEBCAST: Access this webcast for a demonstration and interactive discussion on how you can benefit from moving your digital presence to the cloud and quickly deliver new innovation services, both internally and externally
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

IBM

Virtualization Workloads
sponsored by Dell, Inc.
VIDEO: Watch this brief video to learn how a portfolio of next-generation servers can deliver the performance, scalability, and reliability your virtualized environments need to truly excel.
Posted: 06 Feb 2015 | Premiered: 07 Sep 2014

Dell, Inc.

Want to see JRebel in action? Download your free trial now!
sponsored by ZeroTurnaround
TRIAL SOFTWARE: JRebel is a developer productivity tool that allows Java developers to view code changes instantly. It eliminates the rebuild, restart, redeploy cycle inherent in Java development, which enables developers to get more done in the same amount of time. See for yourself how developers increase team velocity up to 40%!
Posted: 15 Oct 2014 | Premiered: 15 Oct 2014

ZeroTurnaround

What's your Vision for the Future?
sponsored by CA Technologies.
VIDEO: Access this video to get a sense of what's ahead and find out how CA software and the mainframe will make ideas for the future into realities. You'll get insight into how this software and the mainframe will play a role in tomorrow's autonomous cars, applications for healthcare, and home automation.
Posted: 04 Nov 2014 | Premiered: 04 Nov 2014

CA Technologies.

Your Chance to Test Drive a Comprehensive Security System
sponsored by AlienVault
SOFTWARE DEMO: This product demo gives you an opportunity to test drive a unified security management system.
Posted: 24 Feb 2015 | Premiered: 24 Feb 2015

AlienVault

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

The Survival Guide to the EBS R12 Upgrade Survival Guide
sponsored by Dell Software
WEBCAST: This webcast  shows you how to effectively manage an upgrade to Oracle E-Business Suite R12.
Posted: 21 Sep 2011 | Premiered: Sep 21, 2011

Dell Software

TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE: Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Windows Azure Platform Security Essentials: Module 1 - Security Architecture
sponsored by Microsoft
WEBCAST: In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
Posted: 16 Dec 2010 | Premiered: Dec 16, 2010

Microsoft
76 - 89 of 89 Matches Previous Page    2 3 4    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement