Gemalto

Displaying 1-12 of 12 results

  • White Papers // Dec 2013

    Building the Business Case for Cloud SSO

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be...

    Provided By Gemalto

  • White Papers // Nov 2013

    Two-Factor Authentication for Cloud Applications

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the...

    Provided By Gemalto

  • White Papers // Nov 2013

    Identity and Access Management in the Cloud: A Primer

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email,...

    Provided By Gemalto

  • White Papers // Mar 2010

    A Smarter Way to Store PKI Credentials

    Public key infrastructure (PKI) is a proven technology for identity and access management systems that improves IT security and enables secure logon, file encryption, and digital signature for transactions. Other tangible benefits include increased productivity, lower help desk costs for password support and reduced operating expenses due to process enhancements....

    Provided By Gemalto

  • Case Studies // Dec 2009

    Protiva Secure Tokens and Network Security at Baker Tilly

    Baker Tilly began its legacy in 1931 with the direct mission of making its clients' businesses better. In this industry, remote access to information is a must have, and high security is essential for protection of clients' identities and financial assets. In addition, compliance requirements are pushing companies in the...

    Provided By Gemalto

  • White Papers // Apr 2009

    A Browser-Based Approach to Smart Card Connectivity

    Smart cards have provided security services for a wide range of applications including telecommunication, banking, and citizen identification. Connecting web applications with smart cards is a natural step forward to address some of the security issues in today's Web. The traditional approach for smart card based web applications provides security,...

    Provided By Gemalto

  • Case Studies // Apr 2009

    Integrated Smart Card and Fingerprint Biometric Authentication

    With over 135,000 employees worldwide and operations in 55 countries, Paris-based AXA Group (91 billion euros in consolidated 2008 revenue) is the 15th largest organization on the 2008 Fortune Global 500 list based on annual revenue. Because of the value and confidentiality of information in the financial services business, protecting...

    Provided By Gemalto

  • White Papers // Jan 2009

    Telecommunications: The Role of the UICC in Long Term Evolution All IP Networks

    The UICC (Universal Integrated Circuit Card) is the smart card used in mobile terminals for GSM and UMTS/3G networks. It authenticates the subscriber to the network while ensuring the integrity and security of their personal data. It also stores applications for both operator and end-user use for the correct deployment...

    Provided By Gemalto

  • White Papers // Oct 2008

    Operating Software in Secure Electronic Documents

    Secure documents such as passports, identity cards, driver licenses and healthcare cards can be migrated to electronic security by embedding these with a secure electronic component. This type of electronic component comprises a microprocessor running specially developed operating software. Successful implementation of a secure electronic document is achieved when best-in-class...

    Provided By Gemalto

  • Case Studies // Oct 2008

    Convenient Identification Solutions for Secure Access to University Premises and Electronic Internal Information

    In 2005 a new Polish law permitted the use of smart cards as an official student ID. This meant implementing new student ID for 448 universities/ high-schools in Poland. It needed to have strong secure authentication for identity credentials as well as provide physical access to the campus. Gemalto worked...

    Provided By Gemalto

  • White Papers // Oct 2008

    Security and Trust in Mobile Applications

    Traditionally, the mobile application environment has been relatively easy to manage. Operators preloaded devices with some applications, and other applications were made available only via purchase directly from the service provider. In this paradigm, the applet space could be easily controlled by validating each applet on new devices before launch,...

    Provided By Gemalto

  • White Papers // Dec 2006

    A Protection Scheme for Moc-Enabled Smart Cards

    The concept of Match-on-Card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not....

    Provided By Gemalto

  • White Papers // Dec 2013

    Building the Business Case for Cloud SSO

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be...

    Provided By Gemalto

  • White Papers // Nov 2013

    Two-Factor Authentication for Cloud Applications

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the...

    Provided By Gemalto

  • White Papers // Nov 2013

    Identity and Access Management in the Cloud: A Primer

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email,...

    Provided By Gemalto

  • White Papers // Oct 2008

    Operating Software in Secure Electronic Documents

    Secure documents such as passports, identity cards, driver licenses and healthcare cards can be migrated to electronic security by embedding these with a secure electronic component. This type of electronic component comprises a microprocessor running specially developed operating software. Successful implementation of a secure electronic document is achieved when best-in-class...

    Provided By Gemalto

  • Case Studies // Apr 2009

    Integrated Smart Card and Fingerprint Biometric Authentication

    With over 135,000 employees worldwide and operations in 55 countries, Paris-based AXA Group (91 billion euros in consolidated 2008 revenue) is the 15th largest organization on the 2008 Fortune Global 500 list based on annual revenue. Because of the value and confidentiality of information in the financial services business, protecting...

    Provided By Gemalto

  • Case Studies // Dec 2009

    Protiva Secure Tokens and Network Security at Baker Tilly

    Baker Tilly began its legacy in 1931 with the direct mission of making its clients' businesses better. In this industry, remote access to information is a must have, and high security is essential for protection of clients' identities and financial assets. In addition, compliance requirements are pushing companies in the...

    Provided By Gemalto

  • Case Studies // Oct 2008

    Convenient Identification Solutions for Secure Access to University Premises and Electronic Internal Information

    In 2005 a new Polish law permitted the use of smart cards as an official student ID. This meant implementing new student ID for 448 universities/ high-schools in Poland. It needed to have strong secure authentication for identity credentials as well as provide physical access to the campus. Gemalto worked...

    Provided By Gemalto

  • White Papers // Apr 2009

    A Browser-Based Approach to Smart Card Connectivity

    Smart cards have provided security services for a wide range of applications including telecommunication, banking, and citizen identification. Connecting web applications with smart cards is a natural step forward to address some of the security issues in today's Web. The traditional approach for smart card based web applications provides security,...

    Provided By Gemalto

  • White Papers // Mar 2010

    A Smarter Way to Store PKI Credentials

    Public key infrastructure (PKI) is a proven technology for identity and access management systems that improves IT security and enables secure logon, file encryption, and digital signature for transactions. Other tangible benefits include increased productivity, lower help desk costs for password support and reduced operating expenses due to process enhancements....

    Provided By Gemalto

  • White Papers // Dec 2006

    A Protection Scheme for Moc-Enabled Smart Cards

    The concept of Match-on-Card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not....

    Provided By Gemalto

  • White Papers // Jan 2009

    Telecommunications: The Role of the UICC in Long Term Evolution All IP Networks

    The UICC (Universal Integrated Circuit Card) is the smart card used in mobile terminals for GSM and UMTS/3G networks. It authenticates the subscriber to the network while ensuring the integrity and security of their personal data. It also stores applications for both operator and end-user use for the correct deployment...

    Provided By Gemalto

  • White Papers // Oct 2008

    Security and Trust in Mobile Applications

    Traditionally, the mobile application environment has been relatively easy to manage. Operators preloaded devices with some applications, and other applications were made available only via purchase directly from the service provider. In this paradigm, the applet space could be easily controlled by validating each applet on new devices before launch,...

    Provided By Gemalto