Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • After The Breach - Executive Overview - White Paper

    Highly visible security breaches and their subsequent impact in almost every industry have changed the way companies are thinking about and implementing security measures.

    Featured

  • Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both...

    Featured

SORT BY:

Most Recent Alphabetical

A Comprehensive Guide to Securing Data with Database Encryption - White Paper

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. But determining the best way to implement or improve database encryption can b...

H1 2016 Data Breach Report - Breach Level Index

According to the latest Breach Level Index report, there were 974 reported data breaches and more than 554 million compromised data records worldwide in the first half of 2016. 

Other key...

Preparing for the General Data Protection Regulation - White Paper

With the approval of the General Data Protection Regulation (GDPR), many organisations will have to start adapting their business approaches, operations, and security policies.

This white ...

How to Become EPCS Compliant with SafeNet Authentication - White Paper

Complying with the Payment Card Industry Data Security Standard - White Paper

For retailers, financial institutions, payment processors, and a range of other organizations that store or access payment card information, and the service providers that enable their businesses,...

Securing the Smart Grid with HSMs - White Paper

The smart grid is the first major effort to modernize an energy infrastructure that has remained largely unchanged over the past several decades. The smart grid creates a network of links between c...

Key Criteria for Effective Protection of Virtual Workloads in Cloud-Enabled Environments - White Paper

(145 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.