Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
151 - 175 of 496 Matches Previous Page  |  Next Page
Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Find the Anomalies in Your Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

Finding The Perfect Path To The Cloud
sponsored by Crayon Group
WHITE PAPER: Access this white paper to explore how Microsoft has made an early move to make things easier for enterprises that wish to embrace a hybrid environment, and help you consider the steps you need to take.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Crayon Group

Forrester TEI of Microsoft Office 365 Study – Corporate Accounts
sponsored by Microsoft
WHITE PAPER: In this independent Forrester report discover the benefits costs and risk associated with Office 365 implementation. Read on to get the perspective of 4 existing customers with multiple years of using Office 365.
Posted: 03 Apr 2015 | Published: 28 Feb 2015

Microsoft

Four Considerations for Addressing the DDoS Risk for Carriers and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 01 Apr 2015 | Published: 15 Jan 2015

Radware

From Audit Compliance to App Stores, Accelerate your Move to Software Asset Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper will help you prepare for a software audit now and in the future.
Posted: 25 Jul 2014 | Published: 09 May 2013

IBM

Get Out of the Mud of Sinking IT and Business Productivity
sponsored by Ipswitch File Transfer
WHITE PAPER: Access this white paper to learn about 5 challenges that IT leaders commonly face with network performance and low user productivity, as well as their solutions.
Posted: 13 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Evaluating Wireless Intrusion Prevention
sponsored by AirTight Networks, Inc.
WHITE PAPER: This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
Posted: 16 Apr 2013 | Published: 15 Apr 2013

AirTight Networks, Inc.

Evaluation of Enterprise Backup and Recovery Software and Vendors
sponsored by CommVault
WHITE PAPER: Access this exclusive resource for a complete list of findings of an enterprise backup and recovery software and vendor evaluation conducted by Forrester Research, Inc.
Posted: 20 Mar 2014 | Published: 28 Jun 2013

CommVault

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 14 Nov 2013 | Published: 31 Mar 2012

IBM

Find Security Vulnerabilities in Your ASP.NET Applications before Hackers Do
sponsored by Compuware Corporation
WHITE PAPER: Download this product brief to learn how Compuware DevPartner SecurityChecker can help developers build security into applications before applications go into production.
Posted: 01 Dec 2006 | Published: 01 Oct 2006

Compuware Corporation

Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Five Technologies Simplifying Infrastructure Management
sponsored by Liebert Corporation
WHITE PAPER: This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
Posted: 20 Feb 2008 | Published: 01 Jan 2007

Liebert Corporation

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos, Inc.
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos, Inc.

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

Four Common ERP Implementation Mistakes
sponsored by IFS
WHITE PAPER: Here are four common mistakes an implementation leader and team can make, and suggestions on how to avoid them.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

Four Things You Should Know About Securing Your Growing Business
sponsored by Symantec Corporation
WHITE PAPER: SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

Symantec Corporation

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Hewlett-Packard Company

Global Threat Report - September 2011 Backup strategy for your home users
sponsored by ESET
WHITE PAPER: This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET
151 - 175 of 496 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement