Expect 2014 to be a year in which new authentication schemes will be embraced and further change the way we protect our accounts and identities…
Moving Forward: Multi-Factor Authentication Trends for 2014
Posted on 11 December 2013 by Gemalto in Enterprise Security
Microsoft Azure Customers Can Now Maintain Compliance and Control of…
Posted on 16 September 2015 by Gemalto in Enterprise Security
Today, Gemalto announces a product release that gives business owners the ability to encrypt sensitive data on Microsoft Azure while maintaining compliance requirements and achieving…
Securing the Breach, Part 6 – Control Access and Authentication…
Posted on 04 August 2014 by Gemalto in Enterprise Security
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Encryption Key Management: The LifeSTYLE of Managing Your Key LifeCYCLE
Posted on 01 October 2015 by Gemalto in Enterprise Security
To demonstrate vulnerabilities of a homegrown key management system, let’s examine a scenario that replaces your company’s encryption keys with your favorite pair of socks.
The Three Rules for Protecting Enterprise Identities – New eBook
Posted on 26 January 2015 by Gemalto in Enterprise Security
By following the three rules outlined in our ebook, organizations can keep their identities, data, applications, and infrastructure safe.
Is Your Password Putting Your AWS Cloud Data At-Risk?
Posted on 20 October 2015 by Gemalto in Enterprise Security
Enter your user name and password. Did you know that this seemingly simple request could be the downfall of your organization?
Latest comments