Gemalto

Gemalto
Show:
Sort By:
How Identity and Access Management (IAM) Works in the Cloud

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

How Continuous Authentication Is Enhancing Cloud Access Management

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

Data Protection On Demand - DPOD

Deploy and manage key management and hardware security module services, on-demand and from the cloud.

Trusted access and Smart Single Sign-On

Trusted access and Smart Single Sign-On to all your apps with SafeNet Trusted Access, identity-as-a-service.

Authentication-as-a-Service

SafeNet Authentication Service (SAS) delivers fully automated strong authentication from the cloud, enabling organization to protect cloud-based and on-premises applications, from any device with user-friendly token options.

Authentication Management Platforms

Enterprise-grade authentication management platform enables secure access, network access, and PKI digital signing as well as extensive certificate lifecycle management.

Out-of-Band Authentication

OOB authenticators utilize external channels such as SMS or email to send dynamic passwords to users.

Certificate-based PKI Smart Cards

Access Control via Smart Card Authentication

Smartjac’s range of certificate-based smart cards offer strong multi-factor authentication in a traditional credit card form factor and enable organizations to address their PKI security needs. Smartjac's smart cards offer a single solution for strong authentication and applications access control, including remote access, network access, password management, network logon, as well as corporate ID badges, magnetic stripes and proximity.

Smartjac’s certificate-based smart cards meet the highest security standards, including FIPS 140-2 Common Criteria CC EAL5+ and eIDAS compliancy, and enable compliance with security regulations like HIPAA, HSPD-12, SOX, GLBA, FFIEC, Basel II, PCI, and HITRUST.

Remote Access Solutions

SafeNet Authentication Solutions allow effective secure remote access to a company's sensitive resources.

Middleware & Password Management

Security applications consist of middleware and password management software that enable users to securely store and manage authentication credentials.

SafeNet eToken 5110 - usb portable strong authentication

SafeNet portfolio of certificate-based USB tokens offers strong multi-factor authentication in a traditional token form factor, enabling organizations to address their PKI security needs. SafeNet PKI USB tokens offer a single solution for strong authentication and applications access control, including remote access, network access, password management, network logon, as well as advanced applications including digital signature, data and email encryption.

SafeNet eToken 5300 - usb portable third factor authentication

PKI-based Multi-factor Authenticator

In today’s world of on-the-move workforces and mobility, enterprise IT needs to carefully balance security with convenience. Organizations are long-past feeling comfortable with simple user name and passwords being the only protection keeping unwanted intruders from gaining access to networks and identities. That is why more and more businesses depend on Public Key Infrastructure (PKI) to provide the strong security to maintain a safe digital environment.

GlobalPlatform for NFC

GlobalPlatform 2.2 is the interoperable standard to allow a secure implementation & communication between parties. This training will help you to better understand the Global Platform specifications for NFC, including GP2.2 specifications for configuring Secure Element, the amendments A, B, C….for contactless parameters & confidential SE content remote management.

IoT Essentials and Consumer eSIM

This training course will provide you with all the knowledge to understand the impacts & key subjects which require study when deploying eSIMs and Remote SIM Provisioning management solutions into your ecosystem.

Keyword Search

Newsletter signup

Subscribe to our mailing list
* indicates required
By subscribing you accept our
 
 
 

This Site

Webstore menu