Not All Encryption Is Created Equal Posted on 30 July 2015 by Gemalto in Enterprise Security This is the second in a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product… Own Your Encryption Keys—and Prove Control of Your Data in… Posted on 19 February 2015 by Gemalto in Enterprise Security The sole entity responsible for the security of the data is YOU—from the moment you take possession of it to the moment it’s deleted. No… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 13/06/19 @ 20:06 Amul Mutha Is there a replica of Thales 9000 in cloud?29/05/19 @ 06:05 Aljada Hey! it would take about two seconds to disable the connectivity, so make sure it’s protected!28/05/19 @ 11:05 Shahzazd Hi , In dual SIM devices, we do have multiple IMEIs concept. How eSIM is module compatible to this multiple SIM concept? How to get IMEI number against eSIM module to manage the legal implication ?