Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It is the world’s largest manufacturer of SIM cards.

Wikipedia
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • Data breach statistics 2017: First half results are in
    So far this year, the level of social awareness around cybersecurity and data breaches has exploded causing more people sit up and take notice. Historically, the topic was covered predominantly by tech-centric publications but recently has received much more attention from mainstream media. Today’s announcement from the U.S Securities and Exchange Commission (SEC) that a […]
Gemalto
Gemalto
YouTube Video

New YouTube videos detected.

  • Introducing Gemalto Cinterion® IoT Terminals
    Seize competitive advantages with plug & play wireless connectivity for evolving Internet of Things applications. Gemalto’s suite of plug-and-play Cinterion® IoT Terminals offer unprecedented simplicity for new developers and small-scale deployments. With virtually zero design time, no approvals and minimal integration, the IoT Terminals works out-of-the box to quickly connect industrial applicati...
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • A Deeper Dive Into GDPR: Due Diligence and Risk Mitigation
    Prepare for GDPR - start with a risk assessment. GDPR demands that organizations proceed diligently in their approaches to security. Fortunately, organizations like Gemalto can help navigate GDPR’s varied requirements and the solutions. Learn about GDPR due diligence and risk mitigation.
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • Following Instagram breach, users urged: Protect accounts with 2FA
    Following the Instagram breach, users are urged to protect accounts with 2FA. The security hole caught Kasperky Lab’s attention after celebrities’ personal details being offered in an underground forum. How are you protecting your account holders? Is your app security up to date?
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • NY’s New Cybersecurity Regulations: Are you compliant?
    NY’s New Cybersecurity Regulations are helping to make sure we are compliant. The guidelines put in place last month are to protect consumers and ensure the safety and soundness of the financial services industry from cyber-criminals. Are you compliant?
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • How to Defend Against the Gray Market Threat – Part 3
    Part 2 of this blog series looked at the impact of gray market sales on software vendors and device manufacturers. In this third and final installment, you will learn how to defend against diversion of your goods on the gray market. If you want to preserve the integrity of your sales channels, products, and revenue, […]
Gemalto
Gemalto
YouTube Video

New YouTube videos detected.

  • Wearable payments technology
    From wristbands, fitness trackers and watches to jewellery and clothing, the potential of wearables technology is promising. Why not be part of the next innovation wave and revolutionize the way we pay for goods? Launch a new technology that transforms card payments from a commodity into a must-have fashion item: the wearable contactless device. See some of the ways Gemalto makes it happen in this...
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • A Deeper Dive Into GDPR: Breach Notification
    Breach notification is only one piece of the GDPR story. No organization wants to be victim of a data breach. The aftermath costs has immeasurable affects to your reputation and it causes real damage to the individuals whose data was compromised. Take a deeper dive into understanding GDPR.
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • What is an Identity Provider (IdP) and do you need one?
    Chances are you already use an identity provider. When you log in to a new retail website by clicking “Sign in with Google or Facebook,” that’s an example of Google or Facebook acting as a trusted identity provider (IdP), and authenticating you on behalf of that online store.
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • A deeper dive into GDPR: Data Control
    How do we provide a level of data control that is compliant with GDPR? Enter Encryption and key management. Ultimately, with encryption, only key holders are capable of accessing data; this is the way organizations restrict encryption key access and ultimately control the data.
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • A deeper dive into GDPR: Right to be forgotten?
    What does GDPR’s ‘Right to be Forgotten’ mean? Is it absolute? Is it unconditional? How do organizations ensure they are in compliance? Does ‘delete’ achieve GDPR Compliance? Learn more about GDPR and how you can make sure you are in compliance.
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • Physical and Logical Access brings science fiction tech to life
    When the big screen gets real is it creepy or cool? Far-fetched technology inventions, previously only seen in science fiction, are showing up in real life through physical and logical access control microchipping. What are the implications? What does this mean?
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • How to Defend Against the Gray Market Threat – Part 2
    The previous blog post in this series provided an overview of the gray market and the threat it poses to your business. In Part 2, I will be addressing the impact of gray market sales on software vendors and intelligent device manufacturers. Advances in technology, connectivity, and globalization have all enabled massive opportunities for software […]
Gemalto
Gemalto
Blog Post

New blog articles detected.

  • A deeper dive into GDPR: What makes it different?
    What is the new standard for data privacy and security across the EU? What sets GDPR apart from other standards? Who has to prepare for the GDPR? How does GDPR define of personal data? What are the penalties for non-compliance? Understand the specifics and get prepared.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.