Gartner Webinars
Expert insights and strategies to address your priorities and solve your most pressing challenges.
Information Technology
Used in Wireless Transport Layer Security (WTLS) and application-level security functions. A WIM can be used to process and store user identification and authorization information. It also can be used to store encryption and authentication keys, and to perform encryption and digital signature functions on the module. A WIM can be a hardware device, such as a smart card or SIM.
Join your peers for the unveiling of the latest insights at Gartner conferences.
Expert insights and strategies to address your priorities and solve your most pressing challenges.