Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed   
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 

Pretty Good Privacy definition sponsored by, powered by an online computer dictionary
Pretty Good Privacy White Papers (View All Report Types)
76 - 100 of 626 Matches Previous Page  |  Next Page
Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014


Balance Change and Control of Continuous Delivery at Scale
sponsored by Plutora
WHITE PAPER: Find out how to give your release teams a single command center to schedule, manage, and configure test environments so that you can accelerate the flow of code through the software lifecycle while maintaining visibility in fast-moving continuous integration and continuous delivery pipelines.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Best Practices for Integrating Business Process Management
sponsored by MuleSoft
WHITE PAPER: This white paper explores how to implement integrated business process management (BPM) by using an API-led strategy. Uncover best practices for BPM design and learn how to overcome common BPM challenges, create API-led connectivity through a hybrid integration platform, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017


Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016


Bimodal IT Doesn't Mean App Modernization is Complete
sponsored by Skytap, Inc.
WHITE PAPER: Learn about the 3 pillars of app modernization and find out how to see the digital transformation initiated by bimodal IT to its completion by modernizing legacy apps, infrastructure, and processes.
Posted: 14 Feb 2018 | Published: 31 Dec 2017

Skytap, Inc.

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

Bridging the Gap Between IT Operations & Security
sponsored by Splunk
WHITE PAPER: Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network.
Posted: 17 May 2017 | Published: 17 May 2017


Build vs. Buy: Implementing the Right Experimentation Solution
sponsored by Optimizely
WHITE PAPER: This white paper acts a guide for navigating the build vs. buy argument for experimentation platforms. Find out how to drive quality development projects and discover how you can improve A/B testing and configuration for developers.
Posted: 05 Jan 2018 | Published: 05 Jan 2018


Building a Digital Platform to Lead in the API Economy
sponsored by MuleSoft
WHITE PAPER: Learn about the central role played by APIs in making the move from a digital business model to transforming your business into a digital platform at the center of a connected ecosystem, comprised of all your core cloud and on-premise systems.
Posted: 17 Jan 2018 | Published: 17 Jan 2018


Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017


Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017


Business Agility: How Modern Businesses Beat the Competition
sponsored by CA Technologies
WHITE PAPER: Learn about the CA Agile Central platform, a leader in Gartner's Magic Quadrant for enterprise Agile planning tools, and how it helps you accelerate time-to-market for quality app releases.
Posted: 11 Aug 2017 | Published: 31 Jul 2017

CA Technologies

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011


Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Battling Modern Botnets in the Enterprise
sponsored by FireEye
WHITE PAPER: The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.
Posted: 29 Sep 2008 | Published: 01 Sep 2008


Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017


Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017


Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Building and Managing a Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett Packard Enterprise
76 - 100 of 626 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement