Contact Us

Search Resources

Refine Search

Product

No category specified.

Resource Library

Results for White Papers

  • After The Breach - Executive Overview - White Paper

    Highly visible security breaches and their subsequent impact in almost every industry have changed the way companies are thinking about and implementing security measures.

    Featured

  • White Paper - The Impact of Virtualization and The Cloud on Software Entitlements

    The Impact of Virtualization and the Cloud on Software Entitlements WHITE PAPER- A white paper for manufacturers of software-driven hardware devices.

    Featured

SORT BY:

Most Recent Alphabetical

Essential Security Technologies for GDPR Compliance - DQM GRC Whitepaper

Data compliance experts, DQM GRC endeavor to clarify the specific security needs that organisations must consider arising from the GDPR and highlight some of the key technologies that may help.

Big Data Bigger Threats White Paper

Discover the unique risks associated with big data environments in the context of ever-increasing bandwidth. Then examine the increasingly pressing need for high speed encryption to address these t...

Securing Financial Services Data in Transit (US) - White Paper

Financial Services is one of the most tightly regulated business sectors. PCI DSS, GLBA, Basel, SOX, and Privacy Shield, among others all have implications for securing financial data in transit.

How to Protect & Monetize Android Apps - White Paper

The advent of mobile computing via smartphone, tablets, and wearable computing technology has given way to masses of mobile applications or “apps,” as they’re commonly referred to.

2016 Data Breach Report - Breach Level Index

According to the latest Breach Level Index report, there were1,792 reported data breaches and almost 1.4 billion compromised data records worldwide in 2016. 

...

Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environments - White Paper

Network Functions Virtualization (NFV) is unleashing fundamental innovation in the way organizations buy, deploy, and operate network infrastructures. By leveraging open standards and commodity har...

How to Handle Both Cloud and On-Premises Two-Factor Authentication - White Paper

The workforce is becoming increasingly mobile, with more employees working remotely than at any time in history. Advances in technology have enabled remote access capabilities that permit work and ...

(214 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.