Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good Privacy Reports
151 - 175 of 1003 Matches Previous Page  |  Next Page
Choosing an Enterprise Learning Management System
sponsored by Infor
WHITE PAPER: This paper deals with an additional set of considerations often overlooked when purchasing a learning management system (LMS), focusing on two particular intangibles: post-purchase vendor support and hidden costs. Read on to learn about how to make the best LMS decision for your organization.
Posted: 18 Jul 2016 | Published: 18 Jul 2016


City of Los Angeles Integrates Real-Time Security Intelligence Sharing
sponsored by Splunk
CASE STUDY: Access now to learn the challenges the city of Los Angeles faced and how they were ultimately resolved.
Posted: 26 Jul 2016 | Published: 26 Jul 2016


Cloud App and Service Adoption: 11 Key Steps IT Should Take
sponsored by Symantec + Blue Coat
WHITE PAPER: You need to know which cloud service providers will break your fall in the event of unauthorized access to critical data. Uncover 11 steps to secure adoption for cloud apps and services.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Symantec + Blue Coat

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Can the Suite Compete? - What Every Recruiter Needs to Know
sponsored by Jobvite
WHITE PAPER: In this resource, HR and business leaders will find a comparison of the strengths and weaknesses of purpose-specific software and bundled software suites, providing you with key information to help you more strategically meet your organization's talent recruitment goals.
Posted: 19 Apr 2013 | Published: 19 Apr 2013


Case Study - System One
sponsored by Webroot
CASE STUDY: This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013


Case Study : Virgin Media enhances productivity by consolidating testing tools
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This case study looks at how Virgin Media developed a set of transparent, efficient, and unified software testing tools to speed development, and increase quality.
Posted: 07 Nov 2013 | Published: 03 Sep 2012

Hewlett-Packard Enterprise

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Case Study: How a Global Bank Addressed App Security and Lowered Costs
sponsored by Veracode, Inc.
CASE STUDY: A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Veracode, Inc.

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013


Champions of Software as a Service: How SaaS is Fueling Powerful Competitive Advantage
sponsored by IBM
WHITE PAPER: This report dives deep into a study on SaaS and how it is helping companies gain competitive advantage as opposed to simply reducing costs.
Posted: 28 Apr 2014 | Published: 31 Jan 2014


Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 02 Aug 2010 | Published: 02 Aug 2010


Change your ERP strategy: One success story
sponsored by Epicor Software Corporation
WHITE PAPER: EL ES DE engineering needed an integrated system that would provide increased visibility over inventory, time spent on jobs and clarity on purchase order status. Consult this resource to find out how adopting a cloud-based ERP solution gave the company the insight they need.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

Epicor Software Corporation

Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER: This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012

Pangea Systems

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier
sponsored by
EZINE: Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Clabby: Business analytics buying criteria: The Three Maxims
sponsored by IBM.
WHITE PAPER: View this white paper to learn more about what contributes to an effective business analytics buying criteria. It examines the importance of implementing an integrated infrastructure and its relationship to business analytics.
Posted: 22 May 2013 | Published: 17 May 2013


Clinical Approach to Technical Upgrade
sponsored by Hexaware Technologies
WHITE PAPER: In this paper, discover the reasons why you should be considering an SAP upgrade to improve enterprise resource planning (ERP) and how to get started. Learn about new features of the latest SAP release as well as the technical advances and new technologies available to you.
Posted: 01 Nov 2011 | Published: 27 Oct 2011

Hexaware Technologies

Closed Loop Lifecycle Planning©: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper encourages all businesses, regardless of size and complexities, to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Hewlett Packard Enterprise

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015


Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013


Cloud Computing and SaaS: A Practical Guide for Financial Professionals
sponsored by Host Analytics, Inc
WHITE PAPER: This white paper looks at cloud-computing and software-as-a-service (SaaS) technologies and what you need to know about these emerging trends.
Posted: 12 Apr 2012 | Published: 16 Sep 2010

Host Analytics, Inc
151 - 175 of 1003 Matches Previous Page    5 6 7 8 9 10    Next Page
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement