Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both...

    Featured

  • After The Breach - Executive Overview - White Paper

    Highly visible security breaches and their subsequent impact in almost every industry have changed the way companies are thinking about and implementing security measures.

    Featured

SORT BY:

Most Recent Alphabetical

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats present...

Preparing for the General Data Protection Regulation - White Paper

With the approval of the General Data Protection Regulation (GDPR), many organisations will have to start adapting their business approaches, operations, and security policies.

This white ...

CJIS Data-in-Transit Encryption Standards - White Paper

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to...

Best Practices in Identity Management - White Paper

Management of identities can and should be based on public key technology. Learn more about best practices for managing those identities within a public key infrastructure, inc...

Importance of Key Management for Storage Security - White Paper

Over the last few years, as the requirements for data confidentiality and privacy have been magnified, encryption of stored data in the enterprise has become a much more compel...

Qatar’s National Information Assurance Policy (NIAP): How Encryption, Key Management and Authentication are Critical for Compliance

Qatar’s National Information Assurance Policy (NIAP) sets out a broad cybersecurity regulation for organizations’ senior management to protect IT resources from a wide range of cybersecurity threa...

Essential Security Technologies for GDPR Compliance - DQM GRC Whitepaper

Data compliance experts, DQM GRC endeavor to clarify the specific security needs that organisations must consider arising from the GDPR and highlight some of the key technologies that may help.

(158 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.