Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
1 - 25 of 519 Matches Previous Page  |  Next Page
10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

2016 BYOD and Mobile Security Spotlight Report
sponsored by BitGlass
WHITE PAPER: With mobile devices, it's now easier than ever to access data from anywhere, increasing the risk of data leakage. In this report, 800 cybersecurity professionals weigh in on the current and future states of mobile threats, solutions, and what can be done to ensure your enterprise stays secure into the BYOD age.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

IBM

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

2016 Security Trends and Predictions
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.
Posted: 22 Aug 2016 | Published: 04 Dec 2016

Juniper Networks, Inc.

3 Tips for Integrating Field Service Management Software with ERP
sponsored by IFS
WHITE PAPER: Dive deep into three questions to better prepare your business for a successful service management software and enterprise resource planning (ERP) integration.
Posted: 06 Aug 2014 | Published: 31 Dec 2012

IFS

5 Key Business and Technology Needs Being Met by SDN and NFV
sponsored by MASERGY
WHITE PAPER: As the business landscape transforms, IT departments need to understand how emerging technologies like software defined networking and network function virtualization can meet business needs. Access this white paper to discover 5 key business and technology challenges that are being met by SDN and NFV.
Posted: 16 Mar 2016 | Published: 02 Mar 2016

MASERGY

5 Power Gen ERP Lessons From the Manufacturing Industry
sponsored by IFS
WHITE PAPER: Uncover the 5 power generation ERP lessons from the manufacturing industry.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

IFS

6 Things to Consider While Choosing an ERP Software
sponsored by Deskera
WHITE PAPER: The enterprise resource planning (ERP) software market is in flux, so it's more important than ever to understand exactly which vendor is going to meet your unique business needs before you commit. Read on to uncover the top 6 considerations before you dive into the choppy waters of the ERP software market.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Deskera

7 Steps for Building a Digital Strategy in Distribution
sponsored by Infor
WHITE PAPER: The wholesale distribution industry is facing massive disruption due to technological growth, and most companies are taking a reactionary approach. You need to rethink your digital strategy now, because a reactionary "strategy" means you will be left behind. Read on to learn 7 steps to building your best digital distribution strategy.
Posted: 14 Oct 2016 | Published: 31 Aug 2016

Infor

8 Key API Performance Indicators for Digital Business
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper explores and defines some of the most common and useful key API performance indicators (KAPIs). Discover how to boost your API management and analytics with KAPIs like registered API keys, usage consistency, queries per second, and 5 more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

TIBCO Software Inc.

A 10 Minute Guide to Software Harvesting
sponsored by Snow Software
WHITE PAPER: Securing the funding to get started in Software Asset Management (SAM) or Software License Optimization can sometimes be difficult. One way to get the attention of senior business managers is to provide quick wins that point to greater cost savings over time.
Posted: 11 Mar 2016 | Published: 30 Sep 2014

Snow Software

10 Best Practices for Reducing the Stress of IT Audits
sponsored by Dell Software
WHITE PAPER: This paper presents 10 best practices that can greatly reduce or even eliminate the angst so commonly associated with IT audits.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Tips to Manage Requirements for the Internet of Things
sponsored by IBM
WHITE PAPER: To navigate complexity and achieve a new approach to managing requirements, this white paper offers 10 tips to help you adapt to the changes brought about by the Internet of Things (IoT) evolution. Learn key facts about traceability, strategic reuse, and more.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

IBM

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

3 Strategies to Rapidly Deliver User-Friendly Multi-Channel Apps
sponsored by Mendix
WHITE PAPER: As competitors continue to release more user-friendly applications on the market, it's becoming harder to maintain customer loyalty. This white paper reveals 3 critical strategies that can help you satisfy users with your applications. Discover how to quickly deploy apps to deliver immediate business impact and ROI.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

Canvas Systems

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com
1 - 25 of 519 Matches Previous Page    1 2 3 4    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement