Resources Archive - Page 2 of 37 - Entrust, Inc. 9-16 of 289

Establish Your Blueprint for Centralized SSL Certificate Lifecycle Management

December 3, 2014 by Geoff Blaine
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.

Modernizing Your SSL Certificate Management

November 18, 2014 by Geoff Blaine
A Selection Guide to SSL Certificate Lifecycle Management Platforms Deciding on the right SSL management platform for your organization can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation. If you are in the market for SSL [Read More...]

Six Steps to SSL Certificate Management

November 7, 2014 by Geoff Blaine
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. Minimally, certificates need to be replaced at the end of [Read More...]

ePassport Document Inspection with Crossmatch SEEK Avenger

October 29, 2014 by Geoff Blaine
As issuance of ePassports has increased on a global scale, the ability of countries to utilize the new capabilities has not kept pace. Entrust provides governments an easy-to-deploy method for inspecting today’s advanced electronic machine-readable travel documents (eMRTD) at border security checkpoints. Entrust fully integrates with the Crossmatch SEEK Avenger for in-field document inspection. It’s [Read More...]

Deriving a Trusted Mobile Identity from an Existing Credential

October 20, 2014 by Geoff Blaine
With the publication of FIPS 201-2, the ability to place an HSPD-12-compliant credential onto a mobile platform became permissible as defined in the draft NIST Special Publication 800-157. This allows for greater flexibility for future PIV-enabled applications and operations, as the traditional challenges of leveraging strong public key cryptography in mobile devices can be met [Read More...]

Migrate to SHA-2 SSL Certificates – A Step-by-Step Migration Guide

October 3, 2014 by Geoff Blaine
Many organizations urgently need to upgrade to SHA-2 (also known as SHA-256) SSL certificates in conjunction with updated federal and PCI compliance standards currently in place, as well as to meet Microsoft’s and Google’s SHA-1 deprecation policies set to begin in November 2014. SHA-1 has been in use among commercial certification authorities (CAs) since the [Read More...]

TeleSign SMS & Voice Authentication

September 12, 2014 by Geoff Blaine
Seamless Integration with Entrust IdentityGuard The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency. As the use of mobile devices and applications grows, so do the rate and sophistication of network and identity attacks on organizations and individuals. This momentum is compounded by the introduction of numerous [Read More...]

Defending the Internet of Things: Identity at the Core of Security

September 9, 2014 by Geoff Blaine
Attacks on traditional IT systems have resulted in massive loss of money, privacy and intellectual property. Even worse, attacks on the Internet of Things (IoT) potentially threaten our safety. This threat landscape exists alongside the ever-increasing demand for more technology to be embedded into coordinated devices used in healthcare, automobiles, aviation, critical infrastructure and smart [Read More...]