Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy White Papers (View All Report Types)
26 - 50 of 515 Matches Previous Page  |  Next Page
A Platform for Modernizing Java Applications: Designing Workloads for the Cloud and Modern Ecosystems
sponsored by Red Hat
WHITE PAPER: Java-based applications can enable modern development in a cloud-friendly environment. Learn how cloud-based application deployment allows you to take advantage of existing resources while moving toward newer (read: digital) application models.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Red Hat

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

A Structured Design Approach to Business Process Automation & Custom Software Development
sponsored by Red Hat
WHITE PAPER: Discover how to modernize business automation by capitalizing on advances in software development infrastructure, and incorporate them into a new structured, 6-step design approach that eliminates additional risk.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Red Hat

Accelerating Product Innovation Through Agile Development and Continuous Engineering
sponsored by IBM
WHITE PAPER: Access this white paper to learn more about how agile development and continuous engineering are changing the way software engineers work. Read on to discover how innovation has become central to a new collaborative work environment.
Posted: 19 Mar 2015 | Published: 31 Dec 2014


Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Agile Test Data Management: The New Must Have
sponsored by CA Technologies
WHITE PAPER: This report will help you better understand how existing test data management tools support Agile delivery. Access now and explore ways to improve your test data management buying decisions.
Posted: 07 Sep 2016 | Published: 14 Apr 2016

CA Technologies

Allow Your Enterprise Greater Mobile App Security
sponsored by MobileIron
WHITE PAPER: This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016


An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Analyst's take: application drives faster development
sponsored by
WHITE PAPER: Nucleus analyzed existing application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

Application Delivery as an Infrastructure Service
sponsored by Array Networks
WHITE PAPER: This white paper discusses a solution for IaaS providers to use in order to expand their load balancing services.
Posted: 26 Jan 2015 | Published: 01 Sep 2014

Array Networks

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 Research report excerpt, explore the implications of applied behavior analytics (ABA) on today's security landscape. Learn about the ABA market, the different types of behavior analytics, insider monitoring systems and more. Plus, get recommendations on how you can proceed with ABA.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by Intel Security
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

Intel Security

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

Hewlett Packard Enterprise

A Whole Team Approach to Quality
sponsored by Rally Software
WHITE PAPER: Explore this presentation to develop a new approach to quality. Agile projects help build software incrementally, using short iterations of 1-4 weeks to keep development aligned with business needs. Learn more about the benefits of agile development by reading this resource now.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

Rally Software

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009


Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013


Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016


Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

26 - 50 of 515 Matches Previous Page    1 2 3 4 5    Next Page
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement