You will find our identity authentication and data protection technologies at the heart of modern life. We are there when banks ex... Read More
You will find our identity authentication and data protection technologies at the heart of modern life. We are there when banks exchange funds, people cross borders or drivers step into connected cars. Across time zones and continents, we protect businesses, governments and two billion people from data breaches and identity theft. By relying on us, our clients in 180 countries can offer trusted and secure digital services so that their customers and citizens can enjoy their digital lifestyles.
“So far Techjockey has the lowest prices for the software I was looking for. Downloading was prompt and installation went without a glitch. A couple of questions I emailed to them were answered promptly.” Mreetunjay Kumar - Aug 16, 2018
“Gemalto's SafeNet Character and Information Assurance arrangements help clients handle the perimeterless endeavor and "Secure the Break" with an information driven way to deal with the insurance and control of their touchy data, from the center of the system to its farthest edge. ” Nanju Deshwara - Nov 17, 2018
“Protect DB conveys powerful protection for delicate corporate and client data stored in databases. It encourages secure collaboration with comprehensive protection of the structured data.” JOHN THOMAS - Feb 6, 2019
“N/A” Mreetunjay Kumar - Aug 16, 2018
“This company was very helpful! I was looking for a Software. They asked a few questions in a 5-10 minute phone call and then provided 4 useful and appropriate recommendations. They did not bombard me with any unwanted information. They did provide me with other useful tools such as links to demos and pricing, and a scorecard for rating the software. They worked quickly and did not waste any of my time. I highly recommend using Techjockey to help you find a solution to your needs!” Bikram Singh - Aug 16, 2018
“Perfect, I had installed the software half an hour after purchasing it!! Great service” Yogesh Sharma - Aug 23, 2018
“We were somewhat worried on not having restrictive programming that we could screen, yet up until this point, having the SafeNet Confirmation administration carry out that responsibility has demonstrated to be an aid for us. ” VIRENDRA SINGH - Apr 18, 2019
“N/A” Bikram Singh - Aug 16, 2018
“N/A” Yogesh Sharma - Aug 23, 2018
“Jaclyn was very helpful and steered me to a software company that fit our needs perfectly. I probably would never have found this software searching on my own. Highly recommended.” Denis Taravkov - Aug 17, 2018
“This is a genuine great company, i did have a problem at first but these guys sorted me out straight away ( turns out it was my fault). I really could not of asked for more & would always make this my first stop before going anywhere else.” Mohd Muneer Uddin - Aug 24, 2018
“This is the type of applicatin that give the sensitive data type to excel & PDF files. It is secured with password & many ways of protecting program. ” Mrinmoy Borah - Mar 11, 2019
“N/A” Denis Taravkov - Aug 17, 2018
“N/A” Mohd Muneer Uddin - Aug 24, 2018
“Integration into our Active Directory two tier PKI deployment was seamless. Setting up a pair of SA1700s in separate data centers worked like a charm, per the documentation. Their support staff was incredibly helpful when we ran into a procedural issue when setting up the permissions for security officers. While the complexity of the SA1700s exists with determining all the PED keys and operations for interacting with a private key, it's monumental to assure no one person has access to the private key on the HSM.” Alice - Oct 3, 2018
“Responsive. The product works well” Jagdish - Sep 27, 2018
“Gemalto HSM provided our business a level of security which was able to do by other softwares as it stores the cryptographic key in the hardware.” Foram - Feb 6, 2019
“N/A” Aditya - Oct 16, 2018
What type of company is Gemalto ?
What does Gemalto do?
Is Gemalto an Indian company?
What is Gemalto ’s main product?
HPE Hewlett Packard Enterprises| Check Point| IBM | Dell | Oracle | Cisco Systems| Huawei| Web Werks India Pvt. Ltd.| Gemalto | Red Hat |