Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good PrivacyWhite Papers (View All Report Types)
151 - 175 of 457 Matches Previous Page  | Next Page
Hot Vendors: Nexenta - Helping to Define the Software-Defined Enterprise
sponsored by Nexenta
WHITE PAPER: Read this IDC Vendor Profile about the technologies, products, and market strategy of a privately-held U.S.-based company that addresses software-defined storage.
Posted: 25 Nov 2014 | Published: 28 Feb 2014

Nexenta

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

How can SMBs meet the Virtualization Challenge?
sponsored by EMC
WHITE PAPER: Access this infographic to find out how SMBs can ensure that their virtual storage investments support their business goals and budgets.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

EMC

How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Costs
sponsored by Schneider Electric
WHITE PAPER: By utilizing new, proper management software tools, you enable and maximize data center professionals control over energy costs and can allocate IT assets more effectively for the business.
Posted: 07 Nov 2014 | Published: 01 Nov 2011

Schneider Electric

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Go for the Green - Realize Both Cash and Environmental Savings across the Enterprise
sponsored by Metastorm
WHITE PAPER: Implementing a common technology platform for business process management and enterprise modeling - such as Metastorm Enterprise™ - will allow you to "go green" in more ways than one.
Posted: 20 May 2008 | Published: 01 May 2008

Metastorm

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

GPS Receiver Testing
sponsored by National Instruments
WHITE PAPER: Today, the power of software enables you to create GPS waveforms that accurately emulate the real word signal. In addition, advances in instrument bus technology enable record and playback of live GPS signals with PXI instrumentation.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Guide: Security Explorer for SharePoint
sponsored by ScriptLogic Corporation
WHITE PAPER: With the growing emphasis on regulatory compliance requirements, the need to place strict security measures on the permissions within SharePoint has grown.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet, Inc.
WHITE PAPER: This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

SafeNet, Inc.

High-performance protection at the network edge—what, why and how
sponsored by Sophos, Inc.
WHITE PAPER: With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.
Posted: 05 Jan 2010 | Published: 05 Nov 2009

Sophos, Inc.

Hitachi Dynamic Provisioning Software at United Airlines
sponsored by Hitachi Data Systems
WHITE PAPER: This paper describes virtualization capabilities of the new Hitachi Universal Storage Platform™ V with Hitachi Dynamic Provisioning software which improve storage utilization to new levels...
Posted: 11 Aug 2008 | Published: 01 Mar 2008

Hitachi Data Systems

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises (2013)
sponsored by NetSuite
WHITE PAPER: This resource analyzes the economic benefits of cloud computing in the ERP and CRM space, and details how embracing the cloud can be a competitive differentiator for SMBs.
Posted: 14 Feb 2014 | Published: 28 Feb 2013

NetSuite

How to implement virtualization on a budget
sponsored by HP and Intel
WHITE PAPER: Access this exclusive resource to find out how the combination of HP's converged infrastructure and Red Hat's virtualization software create the perfect platform for consolidating your Linux systems.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

HP and Intel

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

HP BladeSystem c-Class SAN Connectivity Technology Brief
sponsored by PC Connection and HP
WHITE PAPER: This paper describes the hardware and software required to connect HP BladeSystem c--Class server blades to Storage Area Networks1 (SANs) using Fibre Channel (FC) interconnect technology.
Posted: 15 Apr 2008 | Published: 01 Jun 2007

PC Connection and HP

HP Device Manager 4.5 User Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett-Packard Company

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

HP Integrity Systems: Family Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Hewlett-Packard Company

HP Non-Stop Multi-core Architecture
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn about the new HP Integrity NonStop BladeSystem, which delivers a highly available, fault-tolerant, linearly scalable system that also dramatically increases performance, reduces costs and complexities, saves floor space...
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Hewlett-Packard Company
151 - 175 of 457 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement