research & software development
users covered by our
Trusted Services Management infrastructure
Trusted digital identities
We're world leader in protecting, verifying and managing digital identities and interactions. This enables our clients to offer personal mobile services, payment security, authenticated cloud access, software monetization, data encryption, machine-to-machine applications and many other services.
The solutions which enable these services are built to protect both ends of the network; at the edge in the form of secure software and devices, and at the core to manage the data they hold and exchange. Our ability to do this is founded on our expertise in security processes, software and cryptography.
We develop and install secure software in diverse products (SIMs, payment cards, eID documents etc.) used to access digital services. Our platforms and services continuously monitor and manage these devices, checking identities,managing transactions and protecting the data they transmit and store.
What we offer
We secure digital services by offering a seamless chain of software, products, platforms and services both at the edge and the core of the network.
The solutions we develop enable our clients to deliver a vast range of secure services in mobile, payment, identity and more. See how our products and services are used in billions of people's digital lives.
Get an interactive view of our solutions
Embedded software and products
At the heart of our business is the development of software which we configure and embed in a multitude of different devices and form factors. These secure operating systems and applications facilitate access by billions of end-users to a widening range of digital applications and services.
Our embedded software and products protecting the edge of the network include, for example, many kinds of payment cards, travel passes, password generators, employee IDs, machine identification modules (MIM), and secure ID documents including ePassports, eID and eHealth cards as well as eDriving licenses. We personalize these devices with the credentials of our clients and the identities of their customers across hundreds of networks.
Platforms and services
Our platforms and services at the core of the network enable us to extend our reach to products in the field and secure data exchanges. This means we can manage the software and protect the confidential data they contain, as well as the services they make possible, throughout their life cycle.
These platforms and services enable, for example, personalization and issuance for payment cards, inter-bank fund transfers, , border control, M2M service delivery, software monetization as well as the management of mobile devices and networks.
Gemalto's solutions at work
Billions of people enjoy the convenience of our solutions every day. These videos show our technology working behind the scenes to ensure digital services are secure and easy to use.