Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good PrivacyWhite Papers (View All Report Types)
126 - 150 of 398 Matches Previous Page  | Next Page
Gaining an Edge in Banking With Business Analytics
sponsored by Information Builders
WHITE PAPER: Sponsored by Information Builders, this Ventana research paper recommends ensuring that users in midsize banks are appropriately empowered by providing them with the right business analytics.
Posted: 03 May 2013 | Published: 03 May 2013

Information Builders

How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises (2013)
sponsored by NetSuite
WHITE PAPER: This resource analyzes the economic benefits of cloud computing in the ERP and CRM space, and details how embracing the cloud can be a competitive differentiator for SMBs.
Posted: 14 Feb 2014 | Published: 28 Feb 2013

NetSuite

How to Build a Massively Scalable Next-Generation Firewall
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Hewlett-Packard Company

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services
sponsored by GlobalSign
WHITE PAPER: This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

GlobalSign

Go for the Green - Realize Both Cash and Environmental Savings across the Enterprise
sponsored by Metastorm
WHITE PAPER: Implementing a common technology platform for business process management and enterprise modeling - such as Metastorm Enterprise™ - will allow you to "go green" in more ways than one.
Posted: 20 May 2008 | Published: 01 May 2008

Metastorm

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

GPS Receiver Testing
sponsored by National Instruments
WHITE PAPER: Today, the power of software enables you to create GPS waveforms that accurately emulate the real word signal. In addition, advances in instrument bus technology enable record and playback of live GPS signals with PXI instrumentation.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Security Explorer for SharePoint
sponsored by ScriptLogic Corporation
WHITE PAPER: With the growing emphasis on regulatory compliance requirements, the need to place strict security measures on the permissions within SharePoint has grown.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet, Inc.
WHITE PAPER: This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

SafeNet, Inc.

High-performance protection at the network edge—what, why and how
sponsored by Sophos, Inc.
WHITE PAPER: With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.
Posted: 05 Jan 2010 | Published: 05 Nov 2009

Sophos, Inc.

Hitachi Dynamic Provisioning Software at United Airlines
sponsored by Hitachi Data Systems
WHITE PAPER: This paper describes virtualization capabilities of the new Hitachi Universal Storage Platform™ V with Hitachi Dynamic Provisioning software which improve storage utilization to new levels...
Posted: 11 Aug 2008 | Published: 01 Mar 2008

Hitachi Data Systems

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

HP BladeSystem c-Class SAN Connectivity Technology Brief
sponsored by PC Connection and HP
WHITE PAPER: This paper describes the hardware and software required to connect HP BladeSystem c--Class server blades to Storage Area Networks1 (SANs) using Fibre Channel (FC) interconnect technology.
Posted: 15 Apr 2008 | Published: 01 Jun 2007

PC Connection and HP

HP Device Manager 4.5 User Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett-Packard Company
126 - 150 of 398 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement