Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • 2016 Global Cloud Security Study - Full Report

    This report presents the findings of The 2016 Global Cloud Data Security Study sponsored by Gemalto. The purpose of this research is to understand trends in cloud governance and security practices...

    Featured

  • Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both...

    Featured

SORT BY:

Most Recent Alphabetical

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats presented by the connecte...

Authentication Best Practices - White Paper

A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact ...

In Control at Layer 2: A Tectonic Shift in Network Security - White Paper

Review this analysis of network threats, which lays the case for Layer 2 network security, and draws on third party reports and customer stories.

Network Metadata: Why Your Organization is Exposed and What to Do About It - White Paper

Look at the risks that network metadata can pose to many organizations, and how traffic flow security can be used to create a safeguard.

Bring Your Own Device (BYOD) and Mobile Security

This white paper covers how organizations can seize business opportunities presented by Bring Your Own Device while eliminating the associated risks.

VPN - When Virtual Security is Not Enough - Technical White Paper

Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure.

Survey of Authentication Technologies - White Paper

(154 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.