Gemalto is now part of the Thales Group, find out more.
Contact Us

Search Resources

Refine Search

Product

Resource Library

Results for eBook

  • The Australian Privacy Amendment (Notifiable Data Breaches) Act 2017 - Ebook

    Learn all about the Australian Privacy Amendment (Notifiable Data Breaches Act of 2017), including, what it entails, why it was created and how your organization can prepare for it.

    Featured

  • Addressing the Data Privacy Act of 2012 (Republic Act 10173) - Ebook

    Do you know what the Data Privacy Act of 2012 (Republic Act of 10173) requires? Failure to comply results in penalties, so stay ahead and read Gemalto’s break-down of the Act and SafeNet solutions...

    Featured

SORT BY:

Most Recent Alphabetical

Maximizing the Data Protection-as-a-Service (DPaaS) Opportunity - Ebook

Now’s the time your customers must ensure their data is secure, and strong encryption and effective key management are essential in addressing this mandate. However, ...

The General Data Protection Regulation - Ebook (Expanded)

The new General Data Protection Regulation (GDPR) creates a baseline data security standard that aligns the patchwork quilt of current member state legislation across the European Union (EU). Now, a...

Secure The Breach: A Step-by-Step Guide for Today's Digital Enterprise - Ebook

The digital world is transforming every aspect of our daily lives, and that includes the way we work. To compete, today’s enterprises are embracing the simplicity and ease of the cloud and SaaS app...

4 Steps to Cloud Access Management - Guide Book

As enterprises embrace more and more cloud-based applications, they encounter management complexities, inefficiencies and password fatigue. By following 4 easy steps, organizat...

The Australian Privacy Amendment (Notifiable Data Breaches) Act 2017 - Ebook

Learn all about the Australian Privacy Amendment (Notifiable Data Breaches Act of 2017), including, what it entails, why it was created and how your organization can prepare for it.

Choosing an Authentication Solution for Criminal Justice Information System (CJIS) Services

With the crucial need to share criminal justice information (CJI) comes the need to protect this sensitive information, the leakage of which can affect the effectiveness of ongoing crime fighti...

(17 resources found) Page:   1 2 3
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.