Entrust IdentityGuard delivers mobile smart credentials
Posted on 25 October 2012.
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard Mobile Smart Credentials.


Available for the iOS, Android and BlackBerry mobile platforms, Entrust transforms mobile devices into multipurpose digital identities for authenticated access to logical networks, cloud applications, physical facilities and building entrances.

"Entrust launched its mobile platform more than three years ago and we continue to innovate with practical capabilities that secure and leverage mobile devices across the enterprise," said Entrust President and CEO Bill Conner. "This technology helps organizations transform mobile devices into strong, multipurpose authenticators for physical, logical and cloud access while driving down the total cost of ownership as part of bring-your-own-device initiatives."

Complimenting those capabilities, Entrust's mobile innovation also helps organizations leverage mobile devices for strong, easy-to-use authentication, which includes two-factor authentication, out-of-band transaction confirmation, mobile smart credentials and future authenticator technology (e.g., biometrics, GPS).

Entrust IdentityGuard enables organizations to leverage everyday smartphones to easily authenticate identities for physical, logical and cloud-based resources, as well as digitally signing data. By taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust embeds digital certificates on smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication.

The mobile platform not only simplifies authentication for end-users, but also helps organizations reduce costs by eliminating the need for dedicated authentication hardware such as tokens, smartcards and smartcard readers.

Entrust IdentityGuard Mobile Smart Credentials augment security and user convenience by leveraging Bluetooth to automatically detect and connect to workstations simply by prompting users to enter a PIN. And once a user leaves the proximity of their machine, the solution can automatically lock the user session, ensuring logical access to the desktop is secured at all times.





Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //