Tablets/PC


​​​​​​​​​​​​​​​​​​​​The tablet market reached a turning point in 2014 experiencing its first slow down since the first tablet release in 2010. With annual sales of between 230 and 260 million units according to analysts, tablets are facing fierce competition from phablets on the one hand and unexpected resistance of PCs on the other hand. Long forecasted as declining PCs have maintained their sales around 315 million units in 2014.
The PC remains a dominant tool for professional use, while tablets are more commonly used for leisure activities, including online banking and shopping. However some professionals also use them in their everyday work.

Add value for your tablet and PCs consumers with security, NFC and cellular subscription management:
Gemalto offers solutions to bring more value to end users with new use cases based on security, NFC and cellular subscription management. These will give device makers keys to differentiate their tablets and PCs in such a competitive landscape and reach specific markets e.g. enterprise segment.

  • Enterprise / BYOD use cases
    • ​​Secure email (encrypt/decrypt/sign)
    • Digital signature of documents
    • Strong authentication to a specific secure zone ​
  • Secure online authentication and payment
    • ​Biometrics-based solution
    • OTP authentication (one-time password)
    • Password companion
    • Two form-factor authentication (FIDO compliant)
  • Device integrity
  • ​Connectivity management to cellular networks


Discover our solutions ​​​​​for tablets and PCs:

  • Embedded Secure Elements and Trusted Service Hub 
    Embedded Secure Element and Trusted Service Hub
    Secure your products & services with embedded Secure Elements and Trusted Service Hub
  • UICC and On-Demand Connectivity services 
    EMBEDDED UICC and On-Demand Connectivity
    Connect your devices with embedded UICC and On-Demand Connectivity services
  • Mobile Wallet Development 
    middleware offer

    Discover our middleware offer making the link between any application and our secure elements

 Documents