Gemalto

Gemalto
Show:
Sort By:
IDBridge CT31 PIV Smart Card Reader

The leading link to secure access. * Designed for ease of use for any level of computer user * Works with all smart card market standards. * The IDBridge portfolio of readers is fully customizable to meet your specific visual brand needs.

IDBridge IDBridge CT510 PIV Smart Card Reader

The leading link to secure access. * Designed for ease of use for any level of computer user * Works with all smart card market standards. * The IDBridge portfolio of readers is fully customizable to meet your specific visual brand needs.

SAS - Authentication Service - OTP platform

Building on award-winning SafeNet Authentication Service, SMARTJAC is now offering SafeNet Trusted Access, a new access management service that makes it easy to manage cloud access with cloud single sign-on, scenario-based access policies and multi-factor authentication—all from the same management platform.

IDGo 5000 Bio Solution

IDPrime .NET 5500 cards and its associated IDGo 5000 Biometric Solution software offer are an innovative solution that provides fingerprint biometric support for IDPrime .NET smart cards integrated with Microsoft Windows XP, 7 and 8.x.

Embedded Secure Element - eSE

A tamper-proof chip, embedded in any mobile device, ensures the data is stored in a safe place and information is given to only authorized applications and people.

USB SIM Card Reader

SIM card reader: Innovative transparent design to highlight the card. Modular concept with accessories: stand, floppy disk tray, to simplify logistics and inventory. Maximum usability and reliability with non removable cable, preventing reader unplugs. Compact and lightweight to optimize shipping expenses on large project deployment, fitting in a standard postal envelope size.

IDGo 800 Middleware and SDK for Mobile Devices

IDGo 800 for Mobiles is a cryptographic middleware that supports the Gemalto IDPrime cards and Secure Elements on Mobile platforms: Contact and contactless smart cards, MicroSD cards, UICC-SIM cards and embedded Secure Elements (eSE).

Entitlement Management

Integrate a web-based entitlement management solution with your back office for easy generation, reporting, and ongoing management of entitlements.

Software Protection & Licensing

Safeguard your software products with a range of licensing solutions designed to protect against IP theft and reverse engineering.

Cloud Monetization

Leverage the cloud to define, provision, control, and track both SaaS and on-premise applications using a cloud-based licensing and enforcement solution.

SafeNet OTP 110 One-Time Password Token

SafeNet OTP hardware tokens provide a strong and scalable foundation for securing access to enterprise, web-based and cloud applications, and complying with privacy and security regulations.
SafeNet hardware tokens offer rich case-branding options, and are field-programmable by the customer, enabling organizations to maintain stringent control over their own critical OTP security data.

A secure and convenient OTP token for protecting your network identities.

SafeNet OTP 110 is a cost effective OATH-compliant OTP hardware token that features waterproof casing, and enables
two-factor authentication in time-sync and event-based modes.

Smartphone and Software Token Authenticators

Mobile authentication solutions provide the security of proven two-factor strong authentication with the convenience, simplicity, and ease of use of OTPs generated on personal mobile devices or PCs.

Offering the convenience of phone-as-a-token authentication, PUSH OTP software authentication for tablets and mobile phones.

 

Grid Authenticator - Pattern-based Authentication

Tokenless technology enables any user to be authenticated anytime and anywhere. Context-based authentication offers convenient, frictionless strong authentication while maintaining the flexibility and agility to add protection with stronger methods of security in higher risk situations. Combined with “step-up” authentication, context-based authentication optimizes a layered approach to access security by assessing user login attributes and matching them against pre-defined security policies.

Keyword Search

Newsletter signup

Subscribe to our mailing list
* indicates required
By subscribing you accept our
 
 
 

This Site

Webstore menu