TECH DIGITAL RESOURCE LIBRARY

Gemalto

Gemalto is the world leader in digital security with 2012 annual revenues of 2.2 billion and more than 10,000 employees operating out of 83 offices and 13 Research & Development centers, located in 43 countries.

We are at the heart of the rapidly evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain and work anytime, everywhere in ways that are enjoyable and safe.

We develop secure embedded software and secure products which we design and personalize. Our platforms and services manage these products, the confidential data they contain and the trusted end-user services made possible.

Our innovations enable our clients to offer trusted and convenient digital services to billions of individuals. Gemalto thrives with the growing number of people using its solutions to interact with the digital and wireless world.

Our Website: http://www.gemalto.com


Latest Content From Gemalto

Whitepaper: Privileged Identity Management

by GemaltoJun 11, 2015

This white paper details the considerations of securing the privileged access user using certificate-based smart card technology.


Whitepaper: Privileged Access Users in the Enterprise

by GemaltoNov 05, 2014

How do you control access to your company's most sensitive data? Do your privileged users have unchecked accessibility?

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Gain control over who accesses your company's sensitive data with Gemalto privileged user management solutions.

Privileged users exist in every organization and they hold the keys to much of any company's most private information. Often thought of as senior executives or those in high profile roles, such as finance, HR, etc, privileged users exist elsewhere in the organizations in the form of IT system administrators. The accounts of these users come with permissions to access a multitude of resources across systems, applications and platforms. Any techniques used to control and monitor access must be simple, efficient and reliable in addition to being highly secure. Smart chip enabled devices provide a solution that can be deployed in a variety of form factors including cards, USB tokens or dual OTP/PKI tokens.

This infographic provides some key statistics and highlights the importance of securing the privileged access user via certificate-based smart card technology


Whitepaper: Privileged Identity Management

by GemaltoNov 02, 2014

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.

Privileged users exist in every organization and they hold the keys to much of any company's most private information. Often thought of as senior executives or those in high profile roles, such as finance, HR, etc, privileged users exist elsewhere in the organizations in the form of IT system administrators. The accounts of these users come with permissions to access a multitude of resources across systems, applications and platforms. Any techniques used to control and monitor access must be simple, efficient and reliable in addition to being highly secure. Smart chip enabled devices provide a solution that can be deployed in a variety of form factors including cards, USB tokens or dual OTP/PKI tokens.

This white paper details the considerations of securing the privileged access user using certificate-based smart card technology.


Whitepaper: Who are you trying to protect?

by GemaltoAug 20, 2014

If we are to progress towards more secure and convenient authentication solutions, we have to start thinking beyond passwords. Multi-factor solutions that operate independent of passwords, are the future. But not all users are created equal. Some need more stringent forms of authentication than others. So who are you trying to protect?


Whitepaper: Securing Executives and Highly Sensitive Documents of Corporations Globally

by GemaltoSep 23, 2013

Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and password authentication is simply not a secure way to protect your organizations most valued assets. Implementing additional security can be a daunting task, which is where Gemalto can help.

Gemalto's whitepaper, Securing Executives and Highly Sensitive Documents of Corporations Globally, outlines the basic steps you need to secure your executives' devices and keep criminals out. This whitepaper will give you an overview of the problems associated with protecting information for mobile executives, and provide potential solutions for your consideration.

This complimentary whitepaper will explore:

• Understanding today's risks and threats

• Additional risks associated with mobile and BYOD

• Examples of use cases and solutions for protecting executive formation


Whitepaper: E-Banking Security Guide

by GemaltoSep 27, 2012