UBM: TECH DIGITAL RESOURCE LIBRARY

Gemalto

Gemalto is the world leader in digital security with 2012 annual revenues of 2.2 billion and more than 10,000 employees operating out of 83 offices and 13 Research & Development centers, located in 43 countries.

We are at the heart of the rapidly evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain and work anytime, everywhere in ways that are enjoyable and safe.

We develop secure embedded software and secure products which we design and personalize. Our platforms and services manage these products, the confidential data they contain and the trusted end-user services made possible.

Our innovations enable our clients to offer trusted and convenient digital services to billions of individuals. Gemalto thrives with the growing number of people using its solutions to interact with the digital and wireless world.

Our Website: http://www.gemalto.com


Latest Content From Gemalto

Whitepaper: Privileged Identity Management

by GemaltoJun 11, 2015

This white paper details the considerations of securing the privileged access user using certificate-based smart card technology.


Whitepaper: Privileged Access Users in the Enterprise

by GemaltoNov 05, 2014

How do you control access to your company's most sensitive data? Do your privileged users have unchecked accessibility?

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Gain control over who accesses your company's sensitive data with Gemalto privileged


Whitepaper: Privileged Identity Management

by GemaltoNov 02, 2014

Every week brings new stories of companies damaged by the breach of sensitive information, a problem that can be prevented by identity-centric best practices. Preventing data loss and protecting sensitive information from unauthorized access should be a top concern of every company. Although implementing strong authentication throughout your organization should be a consideration, starting with those employees who have elevated access is a good start.

Privileged users exist in every


Whitepaper: Who are you trying to protect?

by GemaltoAug 20, 2014

If we are to progress towards more secure and convenient authentication solutions, we have to start thinking beyond passwords. Multi-factor solutions that operate independent of passwords, are the future. But not all users are created equal. Some need more stringent forms of authentication than others. So who are you trying to protect?


Whitepaper: Securing Executives and Highly Sensitive Documents of Corporations Globally

by GemaltoSep 23, 2013

Every week brings new stories of companies damaged by the breach of sensitive information. For IT professionals up against the significant challenge of keeping corporate networks and information secure, top level executives and board members present unique requirements. These highly mobile individuals typically have access to the enterprise's most confidential information, from earnings outlooks to acquisition plans to new products, making them prime targets. It is evident that username and


Whitepaper: E-Banking Security Guide

by GemaltoSep 27, 2012