Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
126 - 150 of 496 Matches Previous Page  |  Next Page
E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

EmpCenter® for Manufacturing
sponsored by Workforce Software
WHITE PAPER: This white paper describes software that can help you automate 100% of your time, scheduling, and leave requirements for your entire workforce, including permanent, temporary, and contract staff, with a single enterprise-grade system.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

Workforce Software

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Enterprise Lifecycle Management in a Changing World: Best Practices for Resolving Emerging Challenges in Unified Endpoint Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Organizations must have processes and automation systems that deliver the agility and extensibility to maintain performance and reliability without sacrificing cost-effectiveness in IT investments. This white paper provides best practices for resolving emerging challenges in unified endpoint management.
Posted: 04 Feb 2015 | Published: 25 Nov 2014

FrontRange Solutions Inc.

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008

IBM

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Kaspersky Lab

Driving Product Quality With Continuous Verification and Validation
sponsored by IBM
WHITE PAPER: Access this informative white paper to learn more about how continuous verification and validation strategies can help quality teams keep up with agile development. Read on to learn about eth methods and approaches that can enable continuous verification and validation and determine the right strategy for your organization.
Posted: 19 Mar 2015 | Published: 14 Oct 2014

IBM

Dynamic Business - From Aspiration to Reality
sponsored by Microsoft India
WHITE PAPER: This resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
Posted: 19 Dec 2013 | Published: 19 Mar 2013

Microsoft India

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Dynamic Initiators That Give You the Control You Need
sponsored by MVS Solutions
WHITE PAPER: This paper discusses the initiator requirements, and how ThruPut Manager optimizes and automates batch job queuing and initiation.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

MVS Solutions

E911 VoIP Essentials for Enterprise Deployments
sponsored by XO Communications
WHITE PAPER: Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements?
Posted: 02 Dec 2010 | Published: 02 Dec 2010

XO Communications

Editor's Choice: Dell KACE Rocks for Windows 7 Deployment
sponsored by Dell KACE
WHITE PAPER: Many IT pros are eager to get started with their Windows 7 rollouts, but not sure which software to use in the process. This article reviews one OS deployment/client management tool and examines its pros, cons, and key features.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Dell KACE

Eight Strategies for First Rate Customer Service
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper provides eight strategies for creating a relationship with your customers that will keep them coming back.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Cisco Systems, Inc.

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

EMC Documentum Enterprise Records Management: The Problem of Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: This paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively.
Posted: 13 Mar 2008 | Published: 01 Aug 2007

EMC Corporation

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output
sponsored by EMC Corporation
WHITE PAPER: Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more.
Posted: 13 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER: Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Epicor Software Corporation
126 - 150 of 496 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement