Follow us
Get in touch with us

Identity and Access Security

​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​We help organizations protect and manage their logical, physical, and cloud-based data assets. Our strong multi-factor authentication solutions support a range of form factors and authentication methods providing the highest level of protection. ​

Security Solutions

Our solutions respond to the needs for strong authentication, data loss prevention, compliance to governmental security directives and the growing demand for qualified digital signature.


Protiva Authentication and
ID Management Solutions

Protiva represents strength and protection of identities, data and network infrastructures, and is the name used for all Gemalto security solutions for public and private organizations.

    Protive Defender Suite 
    Protecting the people who defend us
    Protiva Trade Connect 
    Convenient, secue trading
    Protiva ExecProtect 
    Enterprise data security, ultra-secure laptops & remote access
    Protiva MedSecure 
    Protecting patient data and streamlining authentication
    Protiva Cloud Conform 
    Complete strong authentication for Cloud Service Providers
  • Protiva MedSecure at Seattle Children's

    Seattle Children's needed stronger controls to ensure compliance with regulations like HIPAA, but wanted a flexible security solution that allowed for growth over time to a full certificate-based identity solution. Gemalto's two-factor authentication met hospital needs without compromising convenience or flexibility for busy hospital staff.

    Protiva MedSecure at Seattle Children's



  • Posted on Sep 03, 2014

    Here we go again

    It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach.  The cybercriminals were able to […]

    Read this post

Subscribe to the Identity & Access newsletter