Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for White Papers

  • 2016 Global Cloud Security Study - Full Report

    This report presents the findings of The 2016 Global Cloud Data Security Study sponsored by Gemalto. The purpose of this research is to understand trends in cloud governance and security practices...

    Featured

  • Reducing PCI Compliance Costs and Effort Transparent Tokenization - White Paper

    Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI data out of scope, tokenization presents a host of benefits, helping organizations both...

    Featured

SORT BY:

Most Recent Alphabetical

CJIS Data-in-Transit Encryption Standards - White Paper

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the securi...

Complying with the Payment Card Industry Data Security Standard - White Paper

Assessing the True Cost of Strong Authentication - White Paper

Many organizations rarely look closely at the Total Cost of Operation of their authentication solution and instead make a decision heavily driven by the up-front purchase price. This approach to asse...

A Security Survey of Strong Authentication Technologies - White Paper

All authentication methods are based on providing the legitimate user with a method for proving his or her identity. Such “proof” can involve different form factors, such as something only the user...

Building the Trusted Connected Car - White Paper

As the connected car’s intelligence, services, and ecosystem expands, so do the potential risks and exposures. This paper offers a look at the opportunities and threats presented by the connecte...

Authentication Best Practices - White Paper

A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact ...

In Control at Layer 2: A Tectonic Shift in Network Security - White Paper

Review this analysis of network threats, which lays the case for Layer 2 network security, and draws on third party reports and customer stories.

(154 resources found) Page:   1 2 3 4 5 6 7 8 9 10
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.