Contact Us

Search Resources

Refine Search


No category specified.

Resource Library

Results for White Papers

  • White Paper - The Impact of Virtualization and The Cloud on Software Entitlements

    The Impact of Virtualization and the Cloud on Software Entitlements WHITE PAPER- A white paper for manufacturers of software-driven hardware devices.


  • Addressing Challenges in Software Protecting for .NET - White Paper



Most Recent Alphabetical

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats present...

Preparing for the General Data Protection Regulation - White Paper

With the approval of the General Data Protection Regulation (GDPR), many organisations will have to start adapting their business approaches, operations, and security policies.

This white ...

CJIS Data-in-Transit Encryption Standards - White Paper

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to...

Best Practices in Identity Management - White Paper

Management of identities can and should be based on public key technology. Learn more about best practices for managing those identities within a public key infrastructure, inc...

Importance of Key Management for Storage Security - White Paper

Over the last few years, as the requirements for data confidentiality and privacy have been magnified, encryption of stored data in the enterprise has become a much more compel...

Secure the Breach Manifesto

It's one thing to change your mindset. It’s another to implement a new approach to security across an organization. While there is no “one size fits all” prescription for achieving the Secure Brea...

Qatar’s National Information Assurance Policy (NIAP): How Encryption, Key Management and Authentication are Critical for Compliance

Qatar’s National Information Assurance Policy (NIAP) sets out a broad cybersecurity regulation for organizations’ senior management to protect IT resources from a wide range of cybersecurity threa...

(224 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.