Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • 2016 Global Cloud Security Study - Full Report

    This report presents the findings of The 2016 Global Cloud Data Security Study sponsored by Gemalto. The purpose of this research is to understand trends in cloud governance and security practices...

    Featured

  • Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both...

    Featured

SORT BY:

Most Recent Alphabetical

Essential Security Technologies for GDPR Compliance - DQM GRC Whitepaper

Data compliance experts, DQM GRC endeavor to clarify the specific security needs that organisations must consider arising from the GDPR and highlight some of the key technologies that may help.

Big Data Bigger Threats White Paper

Discover the unique risks associated with big data environments in the context of ever-increasing bandwidth. Then examine the increasingly pressing need for high speed encryption to address these t...

2016 Data Breach Report - Breach Level Index

According to the latest Breach Level Index report, there were1,792 reported data breaches and almost 1.4 billion compromised data records worldwide in 2016. 

...

Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environments - White Paper

Network Functions Virtualization (NFV) is unleashing fundamental innovation in the way organizations buy, deploy, and operate network infrastructures. By leveraging open standards and commodity har...

How to Handle Both Cloud and On-Premises Two-Factor Authentication - White Paper

The workforce is becoming increasingly mobile, with more employees working remotely than at any time in history. Advances in technology have enabled remote access capabilities that permit work and ...

Protect Your Sensitive Data: A Step-by-Step Guide

Own and Manage Your Encryption Keys - White Paper

(154 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.