Contact Us

Search Resources

Refine Search

Product

No category specified.

Resource Library

Results for White Papers

  • IDC Technology Spotlight - Software Monetization: Meeting Customer & Business Needs in a Changing Market

    As software use and delivery continue to evolve, so does the need for software vendors to monetize their offerings in a way that meets their own business goals and customer needs. This Technology Spot...

    Featured

  • White Paper - The Impact of Virtualization and The Cloud on Software Entitlements

    The Impact of Virtualization and the Cloud on Software Entitlements WHITE PAPER- A white paper for manufacturers of software-driven hardware devices.

    Featured

SORT BY:

Most Recent Alphabetical

Crossing the Licensing Chasm: How to Leverage Technology to Transition to a Recurring Revenue Model - White Paper

This paper discusses the growing trend toward subscription and consumption-based revenue generation and the transition from product-centric to customer-value-centric business models. Our goal is to h...

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats presented by the connecte...

Authentication Best Practices - White Paper

A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact ...

On the Radar - Extract the maximum value from software

In Control at Layer 2: A Tectonic Shift in Network Security - White Paper

Review this analysis of network threats, which lays the case for Layer 2 network security, and draws on third party reports and customer stories.

Network Metadata: Why Your Organization is Exposed and What to Do About It - White Paper

Look at the risks that network metadata can pose to many organizations, and how traffic flow security can be used to create a safeguard.

Bring Your Own Device (BYOD) and Mobile Security

This white paper covers how organizations can seize business opportunities presented by Bring Your Own Device while eliminating the associated risks.

(216 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.