Think PKI is dead? Think again Posted on 22 March 2017 by Jennifer Dean in Enterprise Security PKI security is often thought of as too complex, but now, modern credential management automates what IT administrators used to do manually. Explore PKI security… IAM Trends: Securing a fuzzy IT perimeter– Technology overview continued… Posted on 15 March 2017 by Mor Ahuvia in Enterprise Security Identity and access management trends and technologies that have emerged to secure, and restore structure to a fuzzy IT perimeter. IAM Trends: Securing a fuzzy IT perimeter– Technology overview continued… Posted on 08 March 2017 by Mor Ahuvia in Enterprise Security Identity and access management trends are revealing a clouded IT perimeter which makes security challenging. Check out our overview of technologies to help you navigate… RSA Conference 2017: Cybersecurity ideas, new products and more Posted on 03 March 2017 by Carey Daley in Enterprise Security Gemalto had a great week at the 2017 RSA Conference this year connecting with tens of thousands of cybersecurity professionals discovering new approaches and technology,… IAM Trends: Enterprise Mobility Management (Part 4) Posted on 01 March 2017 by Jennifer Dean in Enterprise Security Enterprise mobility management, the corporate badge and bring your own devices bring many opportunities and challenges. Explore them with us in this IAM Trends series. Partners are part of the team at Gemalto Posted on 23 February 2017 by Gemalto in Enterprise Security Gemalto Partner and Sales gathered in Lisbon to network, discuss industry trends, opportunities and address challenges. Are you interested in partnering with data security industry… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 21/03/17 @ 09:03 williyamjoe A computerized digital driver's permit could be viewed as an on-screen adaptation of the conventional permit, yet take note of that it wouldn't simply be a "picture" – the innovation is in reality much more mind boggling and advanced than that. Here's the manner by which it may work. At the point when a permit holder demands it, the backer matches the candidate's telephone and profile on a backend framework. The client then downloads the portable permit through a safe versatile application. The information is encoded and safely recovered.09/03/17 @ 13:03 Russ Hounsome Why cant the likes of Hive and other green monitors have voice as an add on system for vulnerable people or anyone who wants the service. Most people don't tend to answer doors with their mobile phone on hand but these devices are normally installed in main passage ways close to front doors. So Hive like monitors can trigger on agreed / learnt keywords to activate a listen in and response in the event of a person being in danger or needing help. Its not always the machines under attack but sometimes the users.28/02/17 @ 10:02 williyamjoe The drivers are undertaking a Practical Driving Assessment would now have their full assessment recorded digitally.This technology will reassure drivers being tested that their assessment is fair, objective, transparent and easy to review if they have any concerns over the testing process.The transport digital solutions to improve services to the community, maximise the effectiveness of the driver testing process and make our roads safer for everybody.