Contact Us

Search Resources

Refine Search


No category specified.

Resource Library

Results for White Papers

  • IDC Technology Spotlight - Software Monetization: Meeting Customer & Business Needs in a Changing Market

    As software use and delivery continue to evolve, so does the need for software vendors to monetize their offerings in a way that meets their own business goals and customer needs. This Technology Spot...


  • Overcoming Java Vulnerabilities - White Paper



Most Recent Alphabetical

White Paper - Using Software Monetization to Drive Medical Device Innovation, Profit, & Clinician Satisfaction

The medical equipment industry is undergoing a transformation from a hardware only business model to also selling services. Enabling this transformation are technological advancements such as embedded...

Key Criteria for Effective Protection of Virtual Workloads in Cloud-Enabled Environments - White Paper

Enterprises around the world and of every type and size—from smaller start-ups to the Fortune 50, from local municipalities to the largest government agencies—are growing increasingly reliant up...

Point to Point Encryption - White Paper

Payment Card Industry Point-to-Point Encryption (P2PE) standards provide detailed guidelines for building payment processing solutions that safeguard payment data at all times.

In estab...

Smart Grid Security - White Paper

A Comprehensive Guide to Securing Data with Database Encryption - White Paper

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases. But determining the best way to implement or improve database encryption can b...

H1 2016 Data Breach Report - Breach Level Index

According to the latest Breach Level Index report, there were 974 reported data breaches and more than 554 million compromised data records worldwide in the first half of 2016. 

Other key...

Preparing for the General Data Protection Regulation - White Paper

With the approval of the General Data Protection Regulation (GDPR), many organisations will have to start adapting their business approaches, operations, and security policies.

This white ...

(201 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.