Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

Pretty Good Privacy

RSS Feed   
ALSO CALLED: PGP
DEFINITION: Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and  … 

Pretty Good Privacy definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Pretty Good Privacy Reports
176 - 200 of 1313 Matches Previous Page  |  Next Page
Build Modern Apps with Big Data at a Global Scale
sponsored by Microsoft
EBOOK: Find out how to deliver apps that don't have to make the trade-off between the speed of data availability, data access, and consistency. Plus, learn about the pros and cons of using a distributed database as the underlying foundation for app development and user experiences.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

Microsoft

Build Modern Apps with Big Data at a Global Scale
sponsored by Microsoft
EBOOK: Find out how to deliver apps that don't have to make the trade-off between the speed of data availability, data access, and consistency. Plus, learn about the pros and cons of using a distributed database as the underlying foundation for app development and user experiences.
Posted: 01 Feb 2018 | Published: 31 Dec 2017

Microsoft

Build vs. Buy: Implementing the Right Experimentation Solution
sponsored by Optimizely
WHITE PAPER: This white paper acts a guide for navigating the build vs. buy argument for experimentation platforms. Find out how to drive quality development projects and discover how you can improve A/B testing and configuration for developers.
Posted: 05 Jan 2018 | Published: 05 Jan 2018

Optimizely

Build Your Automated Testing Strategy for Continuous Delivery
sponsored by Plutora
EGUIDE: In this expert e-guide, we explore how to build the automated and cloud-based software testing strategy that fits your organization's specific development needs.
Posted: 15 Feb 2018 | Published: 09 Feb 2018


Building a Digital Platform to Lead in the API Economy
sponsored by MuleSoft
WHITE PAPER: Learn about the central role played by APIs in making the move from a digital business model to transforming your business into a digital platform at the center of a connected ecosystem, comprised of all your core cloud and on-premise systems.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

MuleSoft

Building a Modern Employee Portal for Your Digital Workforce
sponsored by Sapho
WEBCAST: Find out how to create an engaging, user-friendly employee portal by accessing systems of record and transforming them into micro apps that can be deployed across desktop and mobile devices.
Posted: 13 Feb 2018 | Premiered: Feb 13, 2018

Sapho

Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Rapid7

Building a Robust A/B Testing Strategy to Deliver Positive User Experiences
sponsored by Optimizely
EBOOK: Find out how to create a robust and scalable A/B testing strategy that encompasses customer-facing teams to maximize the impact of tests across channels, apps, and services so that you can deliver high-performing products with differentiated user experiences.
Posted: 08 Jan 2018 | Published: 31 Dec 2017

Optimizely

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY: Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Business Agility: How Modern Businesses Beat the Competition
sponsored by CA Technologies
WHITE PAPER: Learn about the CA Agile Central platform, a leader in Gartner's Magic Quadrant for enterprise Agile planning tools, and how it helps you accelerate time-to-market for quality app releases.
Posted: 11 Aug 2017 | Published: 31 Jul 2017

CA Technologies

Business Alignment Throughout the DevOps Loop
sponsored by Blueprint Software
WHITE PAPER: Discover how to close the gaps in the DevOps toolchain caused by siloed development tools so that you can truly automate, accelerate, and collaborate across the full delivery cycle.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Blueprint Software

Business Management Software ROI Improvement Guide
sponsored by Sage Software
WHITE PAPER: Aligning technology with your business goals is one of the smartest ways to optimize any software investment (especially when it comes to the cloud). Access this ROI improvement guide to learn how to maximize your business management software solutions to drive great agility and SaaS cost savings.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Sage Software

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Build a Cohesive, Effective Security Strategy
sponsored by Splunk
EGUIDE: Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
Posted: 08 Aug 2016 | Published: 31 Jul 2016

Splunk

BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature
sponsored by Parature, Inc.
CASE STUDY: BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.
Posted: 25 Feb 2008 | Published: 01 Jan 2006

Parature, Inc.

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Building and Managing a Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett Packard Enterprise

Building Blocks of Transparent Web Security: Server-Gated Cryptography
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
Posted: 10 Sep 2007 | Published: 01 Sep 2005

VeriSign, Inc
176 - 200 of 1313 Matches Previous Page    6 7 8 9 10 11    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement