Gemalto
Overview
Gemalto offers digital security with end-to-end security solutions designed to make personal digital interactions more convenient, safe and enjoyable. Gemalto's activities range from the development of software applications through the design and production of secure personal devices such as smart cards, SIMs, e-passports and tokens, to the deployment of managed services for their customers.
Gemalto has 10,000 employees with 90 nationalities and is based in 40 countries. It also has 77 sales and marketing offices; 18 production sites, 30 personalization centers and 11 R&D centers.
Core competencies
Security expertise
Gemalto’s internationally renowned team of security and cryptography experts design and implement new anti-fraud solutions certified to the highest standards.
Design and production of secure personal devices
Gemalto’s expertise spans the entire process for creating secure personal devices. We buy microprocessors, develop operating systems and software, and produce and personalize objects.
Personalization and issuance
Gemalto is a trusted partner for the individual personalization of millions of secure personal devices daily.
How to buy
Contact Gemalto Australia: +612 9513 0700
Contact details
Gemalto
Level 14, Zenith Tower B,
821 Pacific Highway,
Chatswood (Sydney) NSW 2067,
Australia
Tel: +612 9513 0700
Fax: +612 9513 0799
Latest Stories about
- 10 hot quantum-computing startups to watch
- Best tools for single sign-on (SSO)
- IoT roundup: Security problems galore and a way to track urinary infections
- Why I don’t believe Bloomberg’s Chinese spy chip report
- What is a smart city? How to define a smart city
- What is single sign-on? How SSO improves security and the user experience
- Half of Australian organisations boosting IT headcount this year
- Australian organisations struggling with compliance, security report says
- Thales to buy Gemalto
- Shadow cloud apps pose unseen risks
- The road to Java 9: Modular Java finally gets OK'd
- Java modularity specification opposed by Red Hat, IBM is voted down
- As authentication options blossom, startup tries to simplify deployment, maintain flexibility
- 9-vendor authentication roundup: The good, the bad and the ugly
- IoT's not all futuristic: Industry pioneer Jasper makes more connections