Entrust President Talks the Evolution of Identity with IT Harvest

What’s next for Entrust? Entrust president David Wagner sat down with IT Harvest’s Richard Stiennon at RSA Conference 2014 to discuss Entrust’s past, present and future role in security technology, and the state of the industry as a whole.

Datacard Group Acquisition of Entrust

After being acquired by Datacard Group in December 2013, integration of technologies is in the cards for Entrust. Wagner discussed how Datacard Group’s physical security technology pairs perfectly with Entrust’s digital identity security.

“[Datacard Group] is really focusing on personalization and identities,” Wagner said. “As we know, identities are going more and more digital, so that convergence makes sense for us.”

The acquisition is ideal for developing better solutions for financial institutions, governments and enterprises alike. Together, Entrust and Datacard Group will be able to secure users in the physical, logical, payment and mobile spaces.

Evolving Technology to Protect Against Growing Attacks

As major cyberbreaches continue to make headlines, strong authentication is needed more than ever. The core of the problem with point-of-sale (POS) attacks — like the Target breach — is information security. Criminals attacked the network and stole credentials, giving them access to customer information. The securing of the digital identity is now equally as important as protecting the physical card.

“With the rest of the world going to EMV, the U.S. became the market of choice for exploring these kinds of attacks,” Wagner said. “That’s why it is so important in security to continually improve the ecosystem.”

Security With Strength & Transparency

As the need for more secure technology grows, so does the demand for easier-to-use solutions. Entrust offers credentialing and authentication solutions for mobile devices to simplify security for users. The Entrust IdentityGuard platform allows companies to choose authenticators that fit the needs of each transaction. Instead of relying on traditional credential methods like smartcards, Entrust technology allows uses to valid their identities in a number of ways, including from their mobile device.

But it doesn’t stop with mobile devices. Entrust partnered with 3M Cogent to integrate the Entrust IdentityGuard authentication platform with 3M Cogent’s biometric technology, which benefits users in a number of industries, especially law enforcement. Now, officers are able to seamlessly access databases by authenticating their fingerprints using 3M Cogent’s biometric device.

SSL Encryption Moves to the Cloud

Data is constantly being transferred across the Internet and protecting that information through SSL certificates is increasingly necessary. Entrust and the CA Security Council  are invested in making the Internet a safe ecosystem. Moving SSL encryption to the cloud was the best way to safely streamline that service for customers. Entrust IdentityGuard Cloud Services  consolidates the management of digital identities, SSL certificates and credentials from a secure, yet simple to use cloud-based platform.

The Future of Entrust

Entrust has always been committed to evolving its technologies and solutions based on the needs of information security industry. Moving forward, Entrust is excited to continue secure identities in the physical, logical, mobile and cloud spaces.

“We’re focused on doing the best job we can for our customers and partners, primarily in this area of authentication,” Wagner said. “We see a great future for Entrust — [and] for Entrust with Datacard — and we have a really long-term investment approach to take identity forward for the long-term future.”

 

Entrust
Entrust

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.

0 Comments

Add to the Conversation