Nous contacter
Bannière Réseaux sociaux

Actualités, médias et relations publiques

En tant que leader mondial de la sécurité numérique, nous sommes également très fiers du rôle de visionnaire et de pionnier que nous jouons dans le domaine de la sécurité. Nous vous invitons à nous rejoindre sur les réseaux sociaux pour découvrir les nouvelles tendances de la sécurité et autres actualités sur notre blog. Suivez toute l'actualité de notre société tandis que nous œuvrons pour que le monde numérique soit un endroit encore plus sûr.

Icône Blog Gemalto

Blog de la sécurité Gemalto

Retrouvez des publications sur toute l'actualité et toutes les tendances de la sécurité des identités dans la section Sécurité des entreprises du blog Sécurité numérique de Gemalto. Vous y trouverez également des conseils pratiques d'utilisation et bien d'autres sujets.

Ne manquez plus nos publications sur la sécurité en ajoutant blog.gemalto.com/security/ à vos Favoris et en vous abonnant au blog Gemalto sur Feedly ou sur le lecteur de flux d'actualités de votre choix.

 

Icône Blog des mises à jour techniques

Mises à jour techniques de la protection des données

Consultez régulièrement ce site pour retrouver plus de renseignements sur les nouvelles sorties de produit, les mises à niveau, les correctifs et bien plus encore. Abonnez-vous à notre flux RSS ou à notre liste de diffusion afin d'être sûr de ne pas manquer les mises à jour des produits qui vous intéressent.

Aller sur le site Mises à jour techniques de la protection des données


6/9/2015
Embedded Computing Design
5 steps to software monetization

Gray line

6/8/2015
IT Business Edge
Latest Federal Government Breach Shows Lack of Security

Gray line

6/4/2015
The Telegraph
Five top tips for getting your product to market

Gray line

5/28/2015
Dark Reading
IRS Attack Demonstrates How Breaches Beget More Breaches

Gray line

5/28/2015
SC Magazine
Data acquired from non-IRS sources enabled access to 100K taxpayer accounts

Gray line

5/28/2015
IT for Business
Pénurie de compétences : le cinéma s’inscrit-il en sauveur de la cybersécurité ?

Gray line

5/26/2015
TMC.net
Getting Executive Buy-In for a Software Monetization Solution

Gray line

5/27/2015
MainStreet.com
Why Hacking Is Taking Place Even Aboard Flights

Gray line

5/22/2015
Help Net Security
The Importance of Encryption and Key Management to Security Practitioners

Gray line

5/21/2015
Engineering News
Data Protection Should Lie at the Heart of a Firm’s Cybersecurity Strategy

Gray line

5/21/2015
Embedded Computing Design
Flexible and dynamic software licensing in the field

Gray line

5/18/2015
Dataquest India
Gemalto Recognizes APAC Partners at Annual Cipher Partner Summit

Gray line

5/12/2015
Help Net Security
Why Saying YES Is Changing Information Security

Gray line

5/1/2015
Computer Business Review
10 lessons learnt from Ryanair’s Chinese bank hank

Gray line

4/30/2015
eSecurity Planet
Three Quarters of U.S. Execs Say a Cyber Attack Could Seriously Disrupt Business

Gray line

4/27/2015
RSA TV
Interview with Gemalto’s David Etue: Whose Cloud Is It Anyway?

Gray line

4/23/2015
Irish Times
Microsoft Irish data case raises critical issues for cloud computing

Gray line

4/22/2015
CNET
House approves controversial cybersecurity bill

Gray line

4/22/2015
Help Net Security
Gemalto’s Solutions Challenge Today’s Security Thinking

Gray line

4/21/2015
Computer News Middle East
Gemalto’s 2015 Data Security Confidence Index released

Gray line

4/20/2015
telecomasia.net
Firms Too Focused on Perimeter Security

Gray line

4/17/2015
The Wall Street Journal
Survey Roundup: Security Disconnect

Gray line

4/16/2015
Computer Business Review
Confidence low, attacks high - is perimeter security still effective?

Gray line

4/16/2015
Help Net Security
Perception and reality of perimeter security effectiveness

Gray line

4/15/2015
TechWeek Europe
Breach Prevention Is Dead, Encryption Is King

Gray line

4/7/2015
Pro Security Zone
Tackling Today’s Authentication Challenges

Gray line

4/1/2015
SC Magazine
Review: Gemalto SafeNet Authentication Service

Gray line

3/27/2015
San Jose Mercury News
E-file fraud: Identity thieves filing taxes to steal refunds

Gray line

3/20/2015
Enterprise Channels MEA
Gemalto Recognises EMEA Channel Partners

Gray line

3/19/2015
Network World
Health Records are the new Credit Cards

Gray line

3/17/2015
Third Certainty
Don’t let your guard down: Identity theft getting worse

Gray line

3/6/2015
Dark Reading
Does Hollywood Have the Answer to the Security Skills Question?

Gray line

2/17/2015
Chain Store Age
Study: Worldwide data breaches up 49% in 2014

Gray line

2/16/2015
Techworld
Global data breaches reached 1500 last year

Gray line

2/13/2015
SC Magazine
Breach index: Mega breaches, rise in identity theft mark 2014

Gray line

2/13/2015
Computerweekly
Data breaches up 49% in 2014

Gray line

2/13/2015
Computerweekly
PCI Security Standards Council welcomes Obama summit

Gray line

2/12/2015
The Wall Street Journal
1 Billion Data Records Stolen in 2014

Gray line

2/12/2015
CNBC
Year of the Hack? A billion records compromised in 2014

Gray line

2/12/2015
Computerworld
More than 1B records breached in 2014

Gray line

2/12/2015
ZDNet
1 billion data records were stolen last year thanks to poor security

Gray line

2/12/2015
CNET
In shift, hackers want your identity, not just your credit card

Gray line

2/12/2015
The Verge
Nearly 1 billion records were compromised by data breaches in 2014

Gray line

2/9/2015
The Hill
Data Breach Prevention Is Dead

Gray line

2/02/2015
IT Daily
DriveLock 7.5: German endpoint security solution with new functionalities

Gray line

1/30/2015
Elektronik Praxis
Software protection offers added value

Gray line

1/30/2015
Tech Week Europe
Russian Dating Website Buys Back 20 million Stolen Email Addresses

Gray line

1/29/2015
IT Pro Portal
InfoSec heavies weigh in on what the 9th Data Privacy Day taught us

Gray line

1/29/2015
Anabi Systems Blog
3 Simple Steps on How to Stay Safe Online

Gray line

1/29/2015
InfoRiskToday
SafeNet CEO on Data Breach Security

Gray line

1/28/2015
Mail Online
'Internet of Things' gets watchdog: Report calls for extra security to prevent hacking of smart gadgets in homes

Gray line

1/28/2015
CBR
8 ways to celebrate Data Privacy Day securely

Gray line

1/28/2015
IT Security Guru
Data Privacy Day musings from the Infosec community

Gray line

1/28/2015
TKG News
'Internet of Things' gets watchdog: Report calls for extra security to prevent hacking of smart gadgets in homes

Gray line

1/28/2015
The Commentator
Data Privacy Day – businesses warned of security risks

Gray line

1/28/2015
TechWeek Europe
How To Stay Safe Online In 3 Simple Steps

Gray line

1/29/2015
MSN News
How To Stay Safe Online In 3 Simple Steps

Gray line

1/27/2015
CNE
Data Privacy Day | Tips By Gemalto To Staying Safe Online

Gray line

1/27/2015
Information Age
Data Privacy Day is a stark reminder that we need more vigilance online

Gray line

1/22/2015
Surveillance Magazine
How can companies prepare for new EU data regulations?

Gray line

1/21/2015
IT Executive
Kun je het IoT beveiligen?

Gray line

1/21/2015
Professional Security Magazine Online
Hack at shoe retailer

Gray line

1/20/2015
Mail Online
Revealed: How criminals can easily 'suck information' out of smartphones using public Wi-Fi networks

Gray line

1/20/2015
Tech Week Europe
How To Explain Ransomware To A Five-Year-Old

Gray line

1/19/2015
Channel 5 News
Security expert on the risks of using public wi-fi

Gray line

1/19/2015
Channel 5
Public wi-fi networks ‘let criminals suck information out of smartphones’

Gray line

1/15/2015
CSO
President calls for more cybersecurity information sharing

Gray line

1/15/2015
CIO
President calls for more cybersecurity information sharing

Gray line

1/15/2015
Rossiyskaya Gazeta
10 000 of "favourite" passwords were compromised in the USA

Gray line

1/15/2015
IT Nation
Les tendances sécurité 2015 #4, une affaire de tous

Gray line

1/15/2015
CIO On-line
The Cloud: security’s challenge

Gray line

1/15/2015
Le Mag IT
Encryption: the problem of keys

Gray line

1/14/2015
IT Nation
Security Trends 2015 #2 : have a strategic asset

Gray line

1/14/2015
IT Nation
Security Trends 2015 #3: review of mobile and IoT

Gray line

1/13/2015
IT Nation
Security Trends 2015

Gray line

1/13/2015
IT Nation
Security Trends 2015 #1 : new guidelines

Gray line

1/13/2015
L’usine Digitale
SaaS Mode: how can we secure news access?

Gray line

1/13/2015
PC Advisor
Obama proposes new 30-day data breach notification law

Gray line

1/8/2015
Global Banking & Finance Review
Why Banks need a different approach to data security

Gray line

1/8/2015
Publi News
CIO will lose the Security Cloud Battle by SafeNet

Gray line

1/7/2015
eSecurity Planet
9 Enterprise Security Trends for 2015

Gray line

1/7/2015
IT Pro Portal
Security trends 2015 predictions round-up

Gray line

1/5/2015
Channel ME
Bright Outlook

Gray line

1/5/15
GCN
In 2015, agency IT security and operations converge

Gray line


Infosecurity

  • Conference
  • November 01 - November 02, 2017
  • Utrecht, Netherlands
Book a meeting with us

NetApp Insight

Booth #B8 (Bronze Sponsor)

  • Conference
  • November 13 - November 16, 2017
  • Berlin, Germany
Book a meeting with us

Gartner Identity and Access Management Summit 2017

  • Conference
  • November 28 - November 30, 2017
  • Las Vegas, Nevada, United States
Book a meeting with us

RSA Conference 2018

  • Conference
  • April 16 - April 20, 2018
  • San Francisco, CA, United States
Book a meeting with us

SC Magazine awards 4.75 Star Rating to SafeNet Authentication Service (2014)

SC Magazine Finalist for Best Multifactor Solution, SafeNet Authentication Service (2015)

Laurie Usewicz, Vice President of Channel Sales, named a 2014 Channel Chief by The Channel Company’s CRN

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2010)

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2009)

Frost and Sullivan, Enabling Technology of the Year (2009)

SC Magazine 5-Star Rating: Sentinel Software Protection (2010)

SC Magazine Australia Product of the Year: DataSecure (2010)

Frost & Sullivan, Software Licensing and Management Product Line Innovation award: Sentinel Software Monetization Solutions portfolio (2011)

SIIA CODiE Award, Best DRM Solution: Sentinel Cloud (2012)

Merci d'adresser vos demandes à :

Chad Couser
Directeur des communications
(443) 327-1315

Anina Steele
Responsable des communications EMEA
+44 1276608055


Back to Top

Demande d'informations

Nous vous remercions de l'intérêt que vous portez à nos produits. Veuillez remplir le formulaire pour recevoir des informations supplémentaires sur SafeNet ou pour être contacté par un spécialiste SafeNet.

Vos informations

* Adresse électronique:  
* Prénom:  
* Nom:  
* Société:  
* Téléphone:  
* Pays:  
* State (US Only):  
* Province (Canada/Australia Only):  
Project Timeline:  
Commentaires:  
 


En complétant ce formulaire, j’accepte de recevoir des informations de Gemalto et ses filiales, comme décrit dans notre Politique de Confidentialité.