Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It is the world’s largest manufacturer of SIM cards.

Wikipedia
Gemalto
Gemalto
Blog Post
  • An episode of Mr. Robot demonstrates the need for HSM security - hackers exploit poor information security practices to gain access by stealing user credentials. It's important to secure your keys. Is your company following HSM security best practices to avoid a hack?

Gemalto
Gemalto
Blog Post
  • Customers depend on companies to keep their data to safe. Many companies would rather gamble and take the “it won’t happen to us” approach than realize there is a very good chance that it WILL happen to them. It’s only a matter of time. What is the real cost of a data breach?

Gemalto
Gemalto
Blog Post
  • The deadline to comply with the Payment Card Industry Data Security Standard (PCI DSS) is upon is. Organizations that handle branded credit cards from the major card providers are scrambling to determine what is required and how to get there. Are you ready for PCI DSS 3.2?

Gemalto
Gemalto
Blog Post
Gemalto
Gemalto
YouTube Video
  • Here is an example on how we facilitate pilot identity verification and drone registration, securely and seamlessly. This is the first step for safe and secure flights. http://www.gemalto.com/mobile/id-security/id-verification However, our solutions go well beyond this, enabling trust in the drone ecosystem for everyone involved, including drone manufacturers, operators, and public authorities. ...

Gemalto
Gemalto
Blog Post
  • In 2017 the UIDAI, a Government of India statutory authority, mandated the use of HSMs to secure UIDs named "Aadhaar". As Aadhaar contain Personally Identifiable Information (PII), it is important to protect the UIDs and the residents – are you ready to meet compliance?

Gemalto
Gemalto
Blog Post
  • Why are web applications attacks dangerous for financial institutions? How should financial institutions begin to assess their needs to prevent data from being stolen or accessed in the event of a breach? Discover this and how to protect your data to stay off the front page.

Gemalto
Gemalto
Blog Post
  • Gemalto is excited to announce the launch of SafeNet Data Protection on Demand, our new data security-as-a-service platform to help you deliver cost effective encryption, hardware security modules and key management services in the cloud to protect sensitive and regulated data.

Gemalto
Gemalto
YouTube Video
  • Find out how secure environment detection works, with mobile apps which automatically detect operating systems vulnerabilities (Android and IOS) and react accordingly, depending on the security policies. Indeed, without protection, OS vulnerabilities create opportunities for malwares to control apps on the mobile. All Gemalto’s Software Development Kits are protected by root detection libraries ...

Gemalto
Gemalto
Blog Post
  • How do you implement a cloud access management solution? Cloud apps in the enterprise have become mainstream, but moving to cloud-based applications can be challenging. There’s way for you to streamline cloud adoption for everyone, follow these 4 easy steps.

Gemalto
Gemalto
Blog Post
  • Consumers are increasingly adding Internet of Things (IoT) devices like smart baby monitors and web-enabled thermostats to their home networks. Driving these purchasing trends are considerations of greater connectivity, availability, and convenience. Even so, that’s not to say consumers aren’t concerned about the security of their IoT devices. No one knows that better than Gemalto. […]

Gemalto
Gemalto
Blog Post
  • What if you’ve already invested in an on-premises cloud single sign on solution? You can run two solutions in parallel or wait out your license until it expires. Or, you can migrate to a cloud-based SSO solution without losing your current investments. Review some best practices.

Gemalto
Gemalto
Blog Post
  • Given the ongoing growth of data breaches around the world, many businesses have already invested in or are looking into cyber insurance. In 2014, the market saw $2.5 billion in premiums written for insurance policies that cover businesses’ liability in the event they suffer a data security incident. That global premium amount could double by […]

Gemalto
Gemalto
Blog Post
  • An important part of GDPR addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals. Are you ready?

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.