GEMALTO identity and access management Big Data Security Solutions Features

GEMALTO identity and access management Features

Technology / Unified Threat Management (Utm)
Growing phase
5.0
Technology / Product Variants
Identity And Access Management (Iam)
5.0
Software Offered / Big Data Governance
benefits companies in adhering regulations and compliance deadlines, improving the strategic risk management, and automating the governance policies for MDM.
Read More
5.0
Technology / Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
Growing phase
5.0
Product Features and Functionality / Data Type
Data-at-Rest and Data in Motion
3.5
Product Enhancement Development / Product Upgradation
Number of New product upgradations
5.0
Software Offered / Backup and Recovery
Data backup and recovery refers to saving additional copies of company’s data in separate physical or virtual locations.
Read More
5.0
Software Offered / Technology
Encryption, Tokenization and Data Masking
5.0
Services Offered / Support and Maintenance
Support & Maintenance services offered by vendors
3.9
Software Offered / Others (Big Data Customization and Discovery, and Audit and Reporting)
Include audit and reporting, and big data discovery and classification and is used as the process of categorizing data assets based on their nominal values according to their sensitivity
Read More
3.9
Can I help you with something?