Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 
Definition continues below.
Pretty Good PrivacyReports
176 - 200 of 721 Matches Previous Page  | Next Page
Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Eight Ways Better Software Deployment and Management Can Save You Money
sponsored by Dell, Inc.
WHITE PAPER: This resource counts down eight critical benefits you can achieve by learning to effectively manage the software deployment lifecycle. Also inside, find key recommendations to help you get started.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

Dynamic Business - From Aspiration to Reality
sponsored by Microsoft India
WHITE PAPER: This resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
Posted: 19 Dec 2013 | Published: 19 Mar 2013

Microsoft India

Dynamic Initiators That Give You the Control You Need
sponsored by MVS Solutions
WHITE PAPER: This paper discusses the initiator requirements, and how ThruPut Manager optimizes and automates batch job queuing and initiation.
Posted: 21 Jan 2009 | Published: 21 Jan 2009

MVS Solutions

E-Guide: Agile Development Process
sponsored by IBM
EGUIDE: This e-guide examines organizational and team challenges of implementing the agile process. This e-guide also will detail how to scale agile software development to large organizations by scaling agile practices and agile work; how to transition small and large development teams to Scrum; and more.
Posted: 30 Mar 2011 | Published: 29 Mar 2011

IBM

E-Guide: Application Lifecycle Management (ALM)
sponsored by IBM
EGUIDE: This e-guide discusses the benefits and drawbacks of consistency in ALM and the challenges associated with building and managing quality into the SDLC. This e-guide also provides a thorough overview of roles and responsibilities in an ALM-focused organization and more. Read on to gain a deeper insight into ALM.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

IBM

E-Guide: Best practices for selecting high quality hardware for mission-critical applications
sponsored by Cisco Systems, Inc.
EGUIDE: This expert e-guide from SearchSAP.com explores the specific requirements that must be met to maintain high usability and uptime within mission-critical environment such as SAP. Readers will gain access to tips and best practices for selecting server hardware that supports even the most demanding and critical business applications.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

Cisco Systems, Inc.

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

NETGEAR Inc.

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by M86 Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

M86 Security

E-Guide: Improving software with the building security in maturity model
sponsored by IBM
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

IBM

E-Guide: Private Storage Cloud Software and Hardware Product Guide
sponsored by F5 Networks
EGUIDE: This product guide gives a rundown of the major products in the private cloud storage space, some of which are cloud storage software applications that can run on commodity hardware, while others are integrated hardware/software systems.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

F5 Networks

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by Dell, Inc. and Intel®
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Dell, Inc. and Intel®

E-Guide: Avoiding Application Security Pitfalls
sponsored by IBM
EGUIDE: This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

IBM

E911 VoIP Essentials for Enterprise Deployments
sponsored by XO Communications
WHITE PAPER: Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements?
Posted: 02 Dec 2010 | Published: 02 Dec 2010

XO Communications

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by SearchExchange.com
EBOOK: Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchExchange.com

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Editor's Choice: Dell KACE Rocks for Windows 7 Deployment
sponsored by Dell KACE
WHITE PAPER: Many IT pros are eager to get started with their Windows 7 rollouts, but not sure which software to use in the process. This article reviews one OS deployment/client management tool and examines its pros, cons, and key features.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Dell KACE

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

EFG Bank Case Study
sponsored by ArcSight, an HP Company
CASE STUDY: ArcSight Logger 4 provides EFG Bank a platform that allows their auditors to easily search and review logs to prove adherence to strict compliance and regulation laws.
Posted: 21 Sep 2010 | Published: 02 Nov 2009

ArcSight, an HP Company

eGuide: Data management best practices in the new world of archiving
sponsored by IBM
EGUIDE: In this e-guide, you will learn the best practices for managing archival data in a modern and effective world. Tips from expert Bill Inmon include strategies for organizing archival data into "time vaults," considerations for software and hardware releases and ideas on how to manage the day-to-day access of archival
Posted: 16 Nov 2011 | Published: 16 Nov 2011

IBM

EHR Usability Testing Key to Clinician Buy-In, Meaningful Use
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com demonstrates how EHR usability testing can function as a key ingredient to clinician buy-in and meaningful use. Read now to learn how usability testing can help with a quicker return on your EHR investment.
Posted: 01 Aug 2013 | Published: 25 Feb 2013

HP & Intel®

Eight Steps to Better Securing Exchange Server 2010
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Eight Strategies for First Rate Customer Service
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper provides eight strategies for creating a relationship with your customers that will keep them coming back.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Cisco Systems, Inc.
176 - 200 of 721 Matches Previous Page    6 7 8 9 10 11    Next Page
 
PRETTY GOOD PRIVACY DEFINITION (continued): …  is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.How It WorksPGP uses a variation of the public key system. In this system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, … 
Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement