Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
126 - 150 of 651 Matches Previous Page  |  Next Page
Combat Today's Threats with A New Approach to Security
sponsored by Fortinet, Inc.
WHITE PAPER: An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack lifecycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Fortinet, Inc.

Comparing SIEM, Big Data, and Behavior Analytics
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how SIEM can effectively secure your organization's logs where big data can fail. Discover the components of effective and mature SIEM, SIEM's correlation with security context, scaling security detection, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

Hewlett-Packard Enterprise

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

Connectivity Options For Microsoft Office 365
sponsored by Zscaler
WHITE PAPER: In September 2016, Microsoft introduced new guidance on best practices for enterprises looking to deploy Office 365. In these guidelines, learn how Office 365 was built to be accessed securely and reliably via a direct Internet connection.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Zscaler

Continuous Automation: Supporting Cloud, Agile, Lean, and DevOps Development
sponsored by Chef Software
WHITE PAPER: Learn how to support integrated Agile and DevOps teams with continuous automation, whether they're working on premise or with container-based microservices in the cloud. Discover how to enhance your ability to test any changes to code, build and deploy apps at competitive speeds, and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

Chef Software

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

Custom App Development and Integrations for Your Fintech Needs
sponsored by Sphere Software
WHITE PAPER: Diversifying the apps and services you offer can open up a number of critical business opportunities, but it can also be incredibly taxing on your development teams and IT. Discover how a partnership can help you enable rapid app development, custom fintech app integrations, DevOps practices, and more.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Sphere Software

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

CW+: IDC Report - How to manage documents in the enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: In recent years C-level executives in many of the world's largest and most successful organizations have been forced to introduce a wide range of cost-cutting measures as macroeconomic forces continue to create a challenging and uncertain trading environment.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

Cybersecurity: The Rise of the Incident Response Platforms
sponsored by IBM
WHITE PAPER: In this ESG report learn how incident response platforms (IRPs) can solve many of the headaches plaguing IT and CISOs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

IBM

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Composite applications - Break the delivery logjam with HP Service Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This whitepaper takes a look at service virtualization, and how it can speed application development by replicating unavailable components, and improve quality control with multiple scenario testing.
Posted: 07 Nov 2013 | Published: 03 Dec 2012

Hewlett Packard Enterprise

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Customer Perspectives on the Benefits of a Collaborative Process to Deliver Software Quality
sponsored by IBM
WHITE PAPER: This Hurwitz and Associates whitepaper shares the successes, challenges and future plans of three companies - Sogeti Group, Accident Compensation Corporation (ACC), and Scotiabank.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

Customer Relationship Management - Integration for a Customer Centric View
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper provides a valuable list of factors for executive management, IT decision makers and sales professionals to consider when planning a successful CRM integration project.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Sage (UK) Limited

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix
126 - 150 of 651 Matches Previous Page    4 5 6 7 8 9    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement