Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It is the world’s largest manufacturer of SIM cards.

Wikipedia
Gemalto
Gemalto
Blog Post
  • This week, security professionals from across the globe will assemble at the Moscone center in San Francisco for the annual RSA Conference. Behind the excitement of new product launches, informative sessions and sponsored dinners, a solemn truth remains—the number of cyber-attacks against corporate and government data has never been greater and securing these environments has […] The post RSA Conf...

Gemalto
Gemalto
Blog Post
  • Learn the 5 key factors to consider when shopping for an access management solution. Choosing a solution is not an easy decision and addressing your organization’s cost, convenience and security needs should be kept in mind. Read on to get your organization on the right path for selecting an access management solution. The post Before You Choose Microsoft – 5 Access Management Considerations appea...

Gemalto
Gemalto
Blog Post
  • Break down of the 2017 Breach Level Index stats found: 7,125,940 compromised every day 2,96914 compromised records every hour 4,949 compromised records every minute 82 compromised records every second Last year was a monumental year for data breaches. According to the new Breach Level Index (BLI), in 2017, the number of data records compromised in […] The post 2017 Data Breach Level Index: Full ye...

Gemalto
Gemalto
Blog Post
  • One effort enterprises are getting ready for is the GDPR deadline of May 25, 2018. That’s the new General Data Protection Regulation (GDPR) that requires companies to be more accountable to their EU-based users on how their data is controlled and used. Read on to learn how access management lets you comply with GDPR. The post Discover How Access Management Helps You Comply With GDPR appeared first...

Gemalto
Gemalto
YouTube Video
  • Check out Gemalto’s Digital Driver’s License in action in the field! Here’s everything you need to know about DDL – a first-hand glimpse into our pilot activity with the Wyoming Department of Transportation, Driver Services, Highway Patrol, and Cheyenne Regional Airport. Enjoy comprehensive feedback from our experts, and watch these DDL Champions put our innovative technology to the test! Stay up...

Gemalto
Gemalto
Blog Post
  • On Sunday news broke that credit and debit card information from five million customers had been stolen from Saks Fifth Avenue and Lord & Taylor in a data breach orchestrated by FIN7. On 28 March, FIN7 released a new batch of compromised details called “BIGBADABOOM-2” to its Joker’s Stash underground market hub. Security firm Gemini […] The post Card Data from 5M Customers Stolen in Data Breach at...

Gemalto
Gemalto
Blog Post
  • Learn the top 3 security tips your Enterprise can take to ensure you don’t end up in the same situation as Trustico - a 23,000 SSL certificate breach. Trustico's breach could have been avoided had customers been in control of their private keys. Read how to protect your SSL/TLS private keys and certificates now. The post Trustico’s SSL Certificate Breach: A Reminder to Lockdown SSL Private Keys ap...

Gemalto
Gemalto
YouTube Video
  • In our ongoing customer video series, Vesa Helkkula, CEO of Aplicom, explains how a solid foundation of Cinterion 2G, 3G and LTE Java embedded hardware allowed the company to evolve with the industry adding software and services to its telematics offering. Watch the video to learn more. If you’re interested in learning more, visit our dedicated customer section: http://www.gemalto.com/m2m/customer...

Gemalto
Gemalto
YouTube Video
  • Originally designed to deliver convenient and robust risk-based security for online transactions in the banking sector, silent authentication technology uses continuous passive behavioral biometrics authentication to ensure a fluid, personalized, and trusted customer experience. Let's find out how it works with the e-Commerce order scenario with unmanned drone delivery. See more at: https://www....

Gemalto
Gemalto
Blog Post
Gemalto
Gemalto
Blog Post
  • Breach notifications are already rolling into the Australian government in wake of new data protection regulations. On February 22, 2018, the Privacy Amendment (Notifiable Data Breaches) Act of 2017 took full effect in Australia. The OAIC has since received 31 notifications of data breaches from organizations. The post Breach Reports Roll in Following New Austrailian Data Protection Regulations ap...

Gemalto
Gemalto
YouTube Video
Gemalto
Gemalto
YouTube Video
  • Simply stated, they reduce the risk of the card or holder data being altered, copied or reproduced. https://gemal.to/security-features Security features can help in verification by providing intuitive and easy to verify elements that are visible with the naked eye or by touch (tactile effects) and which protect both the document structure and personal data. The objective is to help an Immigrati...

Gemalto
Gemalto
Blog Post
  • Securing IoT devices is a challenge confronting the digital world. To help instill confidence among businesses and consumers, UK government officials conducted a review on the burden of securing IoT devices and analyzed those responses to identify the responsibilities of consumers and businesses regarding IoT security. The post “Code of Practice” Proposed in UK to Help Manufacturers Secure IoT Dev...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.