Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good PrivacyWhite Papers (View All Report Types)
151 - 175 of 398 Matches Previous Page  | Next Page
HP Server Automation Virtual Appliance
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this exclusive white paper to find out the key features of HP's latest server automation software.
Posted: 27 Feb 2014 | Published: 31 May 2013

Hewlett-Packard Company

HR in the Cloud
sponsored by Workday
WHITE PAPER: This whitepaper examines the five big trends that are pushing adoption, examining each trend in-depth and explaining exactly why it is driving a need for SaaS.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Workday

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Ideas International: Staging the Deployment of Private Clouds with IBM SmartCloud Foundation
sponsored by IBM
WHITE PAPER: Access this exclusive, expert white paper to uncover the ins-and-outs of IBM SmartCloud – and how you can benefit from adopting this cloud deployment solution.
Posted: 26 Feb 2014 | Published: 28 Feb 2013

IBM

Identify And Influence Identity Stakeholders
sponsored by Ping Identity Corporation
WHITE PAPER: This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change.
Posted: 20 May 2013 | Published: 16 Jul 2012

Ping Identity Corporation

Identity and Access Management Buyer's Guide
sponsored by IBM
WHITE PAPER: This buyer's guide aims to help you evaluate identity and access management (IAM) solutions and select the one that best aligns with your organization's needs.
Posted: 19 Jul 2013 | Published: 30 Apr 2013

IBM

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV
sponsored by Lumension
WHITE PAPER: This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Posted: 24 Jul 2013 | Published: 03 May 2013

Lumension

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

HP Integrity Systems: Family Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Hewlett-Packard Company

HP Non-Stop Multi-core Architecture
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn about the new HP Integrity NonStop BladeSystem, which delivers a highly available, fault-tolerant, linearly scalable system that also dramatically increases performance, reduces costs and complexities, saves floor space...
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Hewlett-Packard Company

HP ProLiant Servers: Family Guide
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: Shift your IT from technology that merely supports the business to technology that powers the business. The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 21 Apr 2009 | Published: 21 Apr 2009

Hewlett Packard Company and Intel

IBM Active Content: Linking ECM and BPM to Enable the Adaptive Enterprise
sponsored by IBM Software Group
WHITE PAPER: An Active Content-based ECM solution adds significant value to ECM and is unique among ECM solution providers.
Posted: 15 Feb 2008 | Published: 01 Sep 2007

IBM Software Group

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

IBM Cost Buster solutions for Business Analytics: Business Analytics on a budget
sponsored by IBM
WHITE PAPER: This data sheet describes the advantages of IBM Cost Buster solutions for business analytics, which make it easy for small and midsize organizations to invest in leading-edge technology without straining their finances.
Posted: 24 Jan 2012 | Published: 24 Jan 2012

IBM

IBM PureFlex Systems with VMWare: Cloud-ready virtualization with the flexibility of an expert integrated system
sponsored by IBM
WHITE PAPER: This resource explores the benefits of combining IBM PureFlex System with VMware. Inside, discover how you can implement a reliable cloud-ready infrastructure with integrated hardware and software designed for efficient virtualization. Discover if this combination will bring the benefits your organization needs.
Posted: 15 Jul 2013 | Published: 30 Apr 2012

IBM

IBM Rational Team Concert Evaluation Guide
sponsored by IBM
WHITE PAPER: Explore the comprehensive features and functions that the Rational Team Concert tool offers, including integrated work item tracking, source control, continuous builds, agile planning and reporting, and more.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

IBM

IDC link software appliances ease cloud application deployment
sponsored by SUSE
WHITE PAPER: Like most new technology, cloud computing does not come without a certain level of complexity. This white paper evaluates the key drivers for cloud computing and explains how certain software appliances can simplify cloud implementation and accelerate your initiative.
Posted: 13 Jun 2012 | Published: 01 Jan 2012

SUSE

IDC White Paper: Diskless PCs: The Evolution of Enterprise PCs
sponsored by Dell, Inc.
WHITE PAPER: Diskless PCs used in conjunction with image streaming software can provide a PC performance and compatibility experience that is identical to that of a standalone machine, but with all the benefits that centralized environments enable.
Posted: 23 Jan 2008 | Published: 01 Jun 2007

Dell, Inc.

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA, The Security Division of EMC

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.
151 - 175 of 398 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement