Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
1 - 25 of 635 Matches Previous Page  |  Next Page
10 Best Practices for a Fast and Clean Software Implementation
sponsored by Zuora, Inc
WHITE PAPER: Discover 10 best practices for implementing a mission-critical software platform. Learn why it's important to define success, establish requirements consensus in advance, and more.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Zuora, Inc

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

10 Rules for Creating a Mobile Look and Feel
sponsored by OutSystems
WHITE PAPER: In this infographic, you'll learn about 10 rules for delivering an optimal user experience aesthetically and functionally in your mobile app. Discover tips to better connecting with your customers.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

OutSystems

10 Signs You've Outgrown Your Requirements Management Tool
sponsored by Perforce Software, Inc.
WHITE PAPER: Uncover 10 common signs that it's time to upgrade requirements management and learn how to implement an enterprise-grade platform that adapts and scales with your growth.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Perforce Software, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

3 Tips for Integrating Field Service Management Software with ERP
sponsored by IFS
WHITE PAPER: Dive deep into three questions to better prepare your business for a successful service management software and enterprise resource planning (ERP) integration.
Posted: 06 Aug 2014 | Published: 31 Dec 2012

IFS

4 App Deployment Disasters Every Business Should Know About
sponsored by IBM
WHITE PAPER: Mobile and IoT app development emphasize generating and using data – but your power to do more with data relies heavily on your database. Explore 4 common app deployment disasters so that you can learn how to optimize your database and simplify critical development projects.
Posted: 13 Sep 2017 | Published: 30 Apr 2016

IBM

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

5 Criteria for Choosing Enterprise Agile Development Software
sponsored by CA Technologies
WHITE PAPER: Learn how to evaluate and select an Agile software development platform that best suits your organization by uncovering 5 key criteria to consider.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

CA Technologies

5 Power Gen ERP Lessons From the Manufacturing Industry
sponsored by IFS
WHITE PAPER: Uncover the 5 power generation ERP lessons from the manufacturing industry.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

IFS

5 Practices for Reducing Requirements Churn
sponsored by Perforce Software, Inc.
WHITE PAPER: Discover 5 ways to keep your project on time and on budget while keeping requirements churn in check.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Perforce Software, Inc.

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

5 Ways to Update Requirements Management and Accelerate Time-to-Market
sponsored by Perforce Software, Inc.
WHITE PAPER: Discover how to update requirements management software for larger and more complex projects, and uncover 5 key integrated traceability components.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Perforce Software, Inc.

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Tips to Manage Requirements for the Internet of Things
sponsored by IBM
WHITE PAPER: To navigate complexity and achieve a new approach to managing requirements, this white paper offers 10 tips to help you adapt to the changes brought about by the Internet of Things (IoT) evolution. Learn key facts about traceability, strategic reuse, and more.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

IBM

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

3 Strategies to Rapidly Deliver User-Friendly Multi-Channel Apps
sponsored by Mendix
WHITE PAPER: As competitors continue to release more user-friendly applications on the market, it's becoming harder to maintain customer loyalty. This white paper reveals 3 critical strategies that can help you satisfy users with your applications. Discover how to quickly deploy apps to deliver immediate business impact and ROI.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid

5 Key Business and Technology Needs Being Met by SDN and NFV
sponsored by MASERGY
WHITE PAPER: As the business landscape transforms, IT departments need to understand how emerging technologies like software defined networking and network function virtualization can meet business needs. Access this white paper to discover 5 key business and technology challenges that are being met by SDN and NFV.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

MASERGY

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

Canvas Systems

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security
1 - 25 of 635 Matches Previous Page    1 2 3 4    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement