GEMALTO in Encryption Software

Gemalto excels in various business units, which include payment and identity, and mobile. The payment and identity business unit consists of an enterprise security segment that safeguards the customers’ on-premises and cloud environments from advanced cyber threats. The company is highly proficient in encrypting data-atrest and data-in-motion
Show More

USP : Gemalto offers best-in-class layer 2 security, which is capable of encrypting structured and unstructured data in the on-premises and cloud environments. The company has a very strong onpremises encryption portfolio, as it offers Ethernet Encryptors for layer 2 protection. The company offers SafeNet High Speed Encryptors, which are available in various series, such as SafeNet CN9000, SafeNet CN8000, SafeNet CN6000, and SafeNet CN4000. Gemalto’s Ethernet Encryptors provide high assurance, ultra-low latency, and high-speed network performance. The security features supported by Ethernet Encryptors are tamper resistance, anti-probing barriers, flexible encryption policy engine, confidentiality and AES Galois/Counter Mode (GCM) encryption, automatic key management, and traffic flow analysis protection. The performance features of Ethernet Encryptors include minimal latency, high bandwidth, low overhead and high scalability and flexibility.

BUYERS
VENDORS
EXPERTS
4.1
ANALYSTS
 

GEMALTO detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
1.60
1.60
1.60
Services
5.00
3.70
1.20
Focus on Product Innovation
4.25
2.95
1.85
Delivery
5.00
5.00
4.10
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

GEMALTO has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    15 Participants

  • Niche Quadrant

    All-Asia-Pacific

    21 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Company Maturity / Mergers and Acquisitions Strategy
    Partnership and Collaborations
  • Product Maturity / Services
    Managed Services
  • Product Maturity / Services
    Professional Services
  • Product Maturity / Professional Services
    Consulting Service
  • Product Maturity / Professional Services
    Support and Maintenance
  • Product Maturity / Professional Services
    Training and education
  • Company Maturity / Vision Alignment
    New Customers Acquired (Last 1 year)
  • Company Maturity / Vision Alignment
    New Product Launched
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / Type of Algorithm
    AES
  • Product Maturity / Deployment Model
    IaaS
  • Product Maturity / Deployment Model
    PaaS
  • Product Maturity / Deployment Model
    SaaS
  • Company Maturity / Industry Vertical
    Aerospace and Defense
  • Company Maturity / Industry Vertical
    BFSI
  • Company Maturity / Industry Vertical
    Government and Public Sector
  • Company Maturity / Industry Vertical
    Healthcare and Life Sciences
  • Company Maturity / Industry Vertical
    IT and Telecom
  • Company Maturity / Industry Vertical
    Retail and Consumer Goods
WEAKNESSES
  • Company Maturity / Mergers and Acquisitions Strategy
    M&A
  • Product Maturity / Support and Services
    Customer Redressal Mechanism/Program
  • Product Maturity / Support and Services
    Level of Support
  • Product Maturity / Type of Algorithm
    Patented inhouse algorithm
  • Company Maturity / Vision Alignment
    Patents Registered
  • Company Maturity / Partner Ecosystem
    Others please specify
  • Product Maturity / Applications Catered
    Data-in- process/use encryption
  • Product Maturity / Type of Algorithm
    Others (RSA, Blowfish, DES)
  • Company Maturity / Viability
    Latest Revenue
  • Product Maturity / Applications Catered
    Application-level encryption
  • Product Maturity / Applications Catered
    Application-level tokenization
  • Company Maturity / % Revenue from Applications
    Asia-Pacific
  • Product Maturity / Applications Catered
    Column-level encryption
  • Product Maturity / Applications Catered
    Data-at-rest encryption
  • Product Maturity / Applications Catered
    Data-in-motion encryption
  • Company Maturity / % Revenue from Applications
    Europe
  • Product Maturity / Applications Catered
    File level encryption
  • Company Maturity / % Revenue from Applications
    Latin America
  • Company Maturity / % Revenue from Applications
    Middle East and Africa
  • Company Maturity / % Revenue from Applications
    North America

Have you EVER used GEMALTO Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Channel of Delivery / Through Partners
    Third-Party Vendors
  • Deployment Model
    SaaS
  • Solutions Offered
    Cloud Encryption
  • Deployment Model
    PaaS
  • Support and Services
    Data Encryption
  • Applications Catered
    File level encryption
  • Deployment Model
    Cloud
  • Applications Catered
    Application-level encryption
  • Applications Catered
    Application-level tokenization
  • Applications Catered
    Data-in-motion encryption

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

GEMALTO Presence in Encryption Software

Questions & Answers

TOP REVIEWS

Looking for Encryption Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS