X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 pgp desktop security


Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

pgp desktop security  field, we believe that PGP will be hit hard by a number of up-and-coming new desktop encryption products that are beginning to hit the market. Vendor Predictions Sparked by a hot security market that only gets hotter each time a new Federal agency's website gets hacked, NAI is well-positioned to see a more prosperous year in 2000 than it did in 1999. With its new front door MyCIO.com in place, we expect NAI to leverage this market attention to create in-roads to new information technology opportunities

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » pgp desktop security

E-mail Encryption: Protecting Data in Transit


Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre-assign various setup options before the software is rolled out, which can be locked so that the user can no longer change the default settings. Learn more about the main properties of Secure Mail and get an overview of the possible configurations the product offers.

pgp desktop security  that is compatible with PGP Desktop 8.0. However, since no standard method for this exists in the PGP world, interoperability problems with other PGP clients may arise. For this reason, the unformatted text of the message is also sent as plain text (i.e., in a format compatible with the majority of PGP clients), so that at least the text message can be read by each e-mail client. 5.2.3. Rich text format Rich text format is not yet fully supported. The text and the attachments can be sent as well as Read More

Lexiguard&;: The Coming "Adobe Acrobat" of Encryption


A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.

pgp desktop security  $29.00 a desktop, even PGP freeware users will want to see what all the fuss is about. Lexias also offers enterprise pricing packages for licenses purchased in bulk. User Recommendations If your organization is resource constrained and does not have the capital or infrastructure to invest in VPNs or private leased-lines, Lexiguard is a fast and easy solution. If you are a startup, with limited capital, and have highly confidential business plans that you are exchanging with venture capitalists, but don't Read More

New Facts on Web Security and Online transactions


Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Est...

pgp desktop security  facts security online transactions,facts,security,online,transactions,security online transactions,facts online transactions,facts security transactions,facts security online. Read More

IBM Announces IBM Security Intelligence with Big Data


IBM has announced IBM Security Intelligence with Big Data, an offering that combine big data analytics with security intelligence capabilities for addressing both internal and external cyber security threats. The solution aims to provide a comprehensive offering for security analysts to extend their capabilities in detection and prevention. Made in IBM Labs, Security Intelligence

pgp desktop security   Read More

E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services


In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's lead product line is their Security Vulnerability Assessment service.

pgp desktop security  vulnerability assessment,security vulnerability assessment,pci scanning,internet security certification,network penetration testing,software penetration testing,security monitoring,vulnerability test,pci compliance software,website vulnerability scanner,penetration testing,web vulnerability scanner,network penetration test,security penetration testing,penetration test Read More

Malware Security Report: Protecting Your Business, Customers, and Bottom Line


Find out how in Malware Security Report: Protecting Your Business, Customers, and Bottom Line.

pgp desktop security  malware security report protecting business customers bottom line,malware,security,report,protecting,business,customers,bottom,line,security report protecting business customers bottom line,malware report protecting business customers bottom line,malware security protecting business customers bottom Read More

Effective Operational Security Metrics


Due to the changing regulatory environment and the complexity of business today, organizations are facing increased accountability. Security risks, however, can often be difficult to measure and even more difficult to understand by people outside of the department. The key to demonstrating improvement is to translate security information in to business terms. Organizations must align, manage, and measure security around business operations.

pgp desktop security   Read More

Network Security Management


In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents.

pgp desktop security   Read More

Mobile Access Security & Management


The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been further complicated by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices.

pgp desktop security  mobile access security,mobile access management,mobile device support,native client mismatch,bring your own device,BYOD,Ericom Read More

HIPAA-Watch for Security Speeds Up Compliance Part One: Vendor and Product Information


HIPAA-Watch for Security is a tool designed to guide organizations through the risk analysis required by the Health Insurance Portability and Accountability Act (HIPAA) compliance process (US). Relevant Technologies, a leading security research and advisory firm, evaluated HIPAA-Watch for Security to verify how well it performed in guiding organizations through the HIPAA security risk analysis process.

pgp desktop security  hipaa phi,hipaa policies,hipaa policy,hipaa privacy,hipaa privacy act,hipaa privacy and security rules,hipaa privacy rule,hipaa privacy rules,hipaa privacy training,hipaa regulation,hipaa regulations,hipaa rules,hipaa security regulations,hipaa security rule,hipaa software Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

pgp desktop security   Read More

6 Important Steps to Evaluating a Web Security Solution


Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control.

pgp desktop security  email security, web security, cyber security, network security, email filter, web filter, acceptable use policy, AUP, ePolicy, advanced threats, advanced persistent threats, EdgeWave, Read More

The Whitelisting of America: Security for IT


Once upon a time around 1995, the well-known American agency, the National Security Agency (NSA), decided that there was no computer operating system that was adequately secure for their needs.  In analyzing the risks, they found that while UNIX was the most secure, they needed additional protection. They looked at the industry of anti-virus protection, at problems with Trojan software, at the

pgp desktop security   Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

pgp desktop security  Keywords,computer security certification,computer security certifications,information security certification,network security certifications,it security training,white paper security,vulnerabilities security,information security training,security classes,it security courses,network vulnerabilities,computer forensics certifications,information security audit,credit ratings Read More