Resources Archive - Page 2 of 29 - Entrust, Inc. 11-20 of 288

Entrust IdentityGuard Cloud Services – Cloud Identity & Certificate Management

February 19, 2014 by Geoff Blaine
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services, a cloud identity management and certificate management solution, is the world’s first end-to-end digital certificate and cloud identity management [Read More...]

Entrust IdentityGuard Cloud Services PKI

February 19, 2014 by Geoff Blaine
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s managed PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.

Entrust IdentityGuard Biometric Authentication

February 18, 2014 by Geoff Blaine
From law enforcement to financial institutions, today’s organizations require the ability to properly authenticate individuals accessing secure networks to protect from the theft or altering of sensitive information. Entrust IdentityGuard fingerprint-based biometric authentication combines the security and usability required by police, EMS, healthcare workers and others who need quick access to online resources.

Zero to Dual_EC_DRBG in 30 minutes: The Suspect Dual EC DRBG Cryptographic Mechanism

February 6, 2014 by Geoff Blaine
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States. NIST helps promote domestic innovation by advancing, monitoring and evaluating technical standards and measurement sciences. Core to its mission, NIST produces special publications to disseminate policies, standards and findings to related security and technology communities. [Read More...]

It’s Cyber Warfare: How Financial Institutions and Banks can use Authentication to Secure Identites and Transactions

February 6, 2014 by Geoff Blaine
Today, financial institutions offering Internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware (e.g., man-in-the-browser attacks, ZeuS, SpyEye, Ice IX, ransomware) and other fraudulent activities. With significant advances in criminal threats — both in sophistication and sheer frequency — organizations such as the U.S. Federal Financial Institutions Examination [Read More...]

Healthcare Authentication for Centers for Medicare & Medicaid Services Compliance

January 24, 2014 by Geoff Blaine
In July 2012, the Centers for Medicare & Medicaid Services (CMS) issued the standard1 for the use of multifactor authentication mechanisms in CMS systems. As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations. We work with many of the top healthcare organizations in the United [Read More...]

Entrust Private SSL Certificates

January 15, 2014 by Geoff Blaine
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates. Deploying Entrust Private [Read More...]

What is Code Signing?

October 18, 2013 by Craig Edwardson
This paper discusses how code signing works and the best practices to perform code signing.

Investing in our Nation’s Cyber Security: PEGCC

September 30, 2013 by Craig Edwardson

White Paper: Why Mobile Is the Next Digital Identity

August 6, 2013 by Geoff Blaine
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces? It starts with the development of mobile platforms, where proven security was deliberate from the draft stages. This wasn’t always [Read More...]