Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • After The Breach - Executive Overview - White Paper

    Highly visible security breaches and their subsequent impact in almost every industry have changed the way companies are thinking about and implementing security measures.

    Featured

  • 2016 Global Cloud Security Study - Full Report

    This report presents the findings of The 2016 Global Cloud Data Security Study sponsored by Gemalto. The purpose of this research is to understand trends in cloud governance and security practices...

    Featured

SORT BY:

Most Recent Alphabetical

Assessing the True Cost of Strong Authentication - White Paper

Many organizations rarely look closely at the Total Cost of Operation of their authentication solution and instead make a decision heavily driven by the up-front purchase price. This approach to asse...

A Security Survey of Strong Authentication Technologies - White Paper

All authentication methods are based on providing the legitimate user with a method for proving his or her identity. Such “proof” can involve different form factors, such as something only the user...

Complying with the Payment Card Industry Data Security Standard - White Paper

Preparing for the General Data Protection Regulation - White Paper

With the approval of the General Data Protection Regulation (GDPR), many organisations will have to start adapting their business approaches, operations, and security policies.

This white ...

How Core to Edge Security Can Boost Banks' Competitiveness in Disrupted Markets - White Paper

CJIS Data-in-Transit Encryption Standards - White Paper

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the securi...

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats presented by the connecte...

(153 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.