Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good PrivacyReports
151 - 175 of 868 Matches Previous Page  | Next Page
Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.
Posted: 11 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Conquering the sys-admin challenge
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from Quocirca presents new data on how well organisations are able to automate their sys-admin procedures, manage the use of privilege and satisfy the requirements of auditors.
Posted: 29 Oct 2012 | Published: 29 Oct 2012

ComputerWeekly.com

Consolidated Management: Resolve, Report and Prevent Backup Failures
sponsored by APTARE
WHITE PAPER: This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Control Your IT Infrastructure Remotely With the Right Management Tools
sponsored by Avocent
CASE STUDY: Read this informative resource to learn how Atos, one of Germany's largest outsourcing specialists, overcame their IT management challenges and created a better work environment for their staff by utilizing IT management software to manage their datacentres and server rooms remotely.
Posted: 08 May 2014 | Published: 31 Dec 2010

Avocent

Cool Vendors in Application and Endpoint Security, 2014
sponsored by Digital Guardian
WHITE PAPER: This resource from Gartner evaluates 5 cutting-edge security vendors that are not necessarily market-proven, but are producing technologically sophisticated application and endpoint security products that early adopters may find highly promising.
Posted: 02 Dec 2014 | Published: 02 May 2014

Digital Guardian

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Computer Weekly – 19 February 2013: Software Developers in demand
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now.
Posted: 18 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Computer Weekly – 2 April 2013: The benefits of context-aware security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Computer Weekly – 23 April 2013: Time runs out for Windows XP – what should you do?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with less than a year until Microsoft ends support for Windows XP, we examine the options for the many firms still using the operating system. The PC market has seen a record slump in sales - what does it mean for the IT industry? Plus, we evaluate progress in moving software to the cloud. Read the issue now.
Posted: 22 Apr 2013 | Published: 23 Apr 2013

ComputerWeekly.com

Computer Weekly – 26 November 2013: Embracing wearable technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the London researchers developing multi-sensory communications via wearable mobile devices. We report from the Gartner Symposium on how CIOs are turning away from traditional IT suppliers. And we look at the role of the IT leader in 2020. Read the issue now.
Posted: 25 Nov 2013 | Published: 26 Nov 2013

ComputerWeekly.com

Computer Weekly – 28 May 2013: The Ministry of Defence gets agile
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how agile development is helping the UK Ministry of Defence deliver complex military software. The CIO of the Lotus Formula One team explains the importance of data analytics to winning races. And we look at the IT innovation challenges facing financial services firms. Read the issue now.
Posted: 28 May 2013 | Published: 28 May 2013

ComputerWeekly.com

Computer Weekly – 3 December 2013: The future of local government IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how visionary IT leaders in local government plan to transform the delivery of digital public services. Our latest buyer's guide looks at the technology challenges of the internet of things. And do businesses dealing with tech-savvy consumers need a new approach to IT management? Read the issue now.
Posted: 02 Dec 2013 | Published: 03 Dec 2013

ComputerWeekly.com

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now.
Posted: 07 Jan 2013 | Published: 08 Jan 2013

ComputerWeekly.com

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Converged network, storage and compute infrastructure: Are we there yet?
sponsored by SearchNetworking.com
EBOOK: Access this expert e-guide to learn how you can make a converged network infrastructure a reality and achieve top efficiency.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchNetworking.com

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

CounterMeasures™ Enterprise Platform 8.0
sponsored by Alion Science and Technology
PRODUCT OVERVIEW: Enterprise Platform 8.0 is the most powerful and flexible of the products in the CounterMeasures™ line.
Posted: 24 Jan 2006 | Published: 01 Jan 2005


Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software
151 - 175 of 868 Matches Previous Page    5 6 7 8 9 10    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement