Entrust IdentityGuard delivers mobile smart credentials
Posted on 25 October 2012.
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard Mobile Smart Credentials.


Available for the iOS, Android and BlackBerry mobile platforms, Entrust transforms mobile devices into multipurpose digital identities for authenticated access to logical networks, cloud applications, physical facilities and building entrances.

"Entrust launched its mobile platform more than three years ago and we continue to innovate with practical capabilities that secure and leverage mobile devices across the enterprise," said Entrust President and CEO Bill Conner. "This technology helps organizations transform mobile devices into strong, multipurpose authenticators for physical, logical and cloud access while driving down the total cost of ownership as part of bring-your-own-device initiatives."

Complimenting those capabilities, Entrust's mobile innovation also helps organizations leverage mobile devices for strong, easy-to-use authentication, which includes two-factor authentication, out-of-band transaction confirmation, mobile smart credentials and future authenticator technology (e.g., biometrics, GPS).

Entrust IdentityGuard enables organizations to leverage everyday smartphones to easily authenticate identities for physical, logical and cloud-based resources, as well as digitally signing data. By taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust embeds digital certificates on smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication.

The mobile platform not only simplifies authentication for end-users, but also helps organizations reduce costs by eliminating the need for dedicated authentication hardware such as tokens, smartcards and smartcard readers.

Entrust IdentityGuard Mobile Smart Credentials augment security and user convenience by leveraging Bluetooth to automatically detect and connect to workstations ó simply by prompting users to enter a PIN. And once a user leaves the proximity of their machine, the solution can automatically lock the user session, ensuring logical access to the desktop is secured at all times.





Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Sep 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //