Resources Archive - Page 2 of 36 - Entrust, Inc. 9-16 of 285

Deriving a Trusted Mobile Identity from an Existing Credential

October 20, 2014 by Geoff Blaine
With the publication of FIPS 201-2, the ability to place an HSPD-12-compliant credential onto a mobile platform became permissible as defined in the draft NIST Special Publication 800-157. This allows for greater flexibility for future PIV-enabled applications and operations, as the traditional challenges of leveraging strong public key cryptography in mobile devices can be met [Read More...]

Migrate to SHA-2 SSL Certificates – A Step-by-Step Migration Guide

October 3, 2014 by Geoff Blaine
Many organizations urgently need to upgrade to SHA-2 (also known as SHA-256) SSL certificates in conjunction with updated federal and PCI compliance standards currently in place, as well as to meet Microsoft’s and Google’s SHA-1 deprecation policies set to begin in November 2014. SHA-1 has been in use among commercial certification authorities (CAs) since the [Read More...]

TeleSign SMS & Voice Authentication

September 12, 2014 by Geoff Blaine
Seamless Integration with Entrust IdentityGuard The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency. As the use of mobile devices and applications grows, so do the rate and sophistication of network and identity attacks on organizations and individuals. This momentum is compounded by the introduction of numerous [Read More...]

Defending the Internet of Things: Identity at the Core of Security

September 9, 2014 by Geoff Blaine
Attacks on traditional IT systems have resulted in massive loss of money, privacy and intellectual property. Even worse, attacks on the Internet of Things (IoT) potentially threaten our safety. This threat landscape exists alongside the ever-increasing demand for more technology to be embedded into coordinated devices used in healthcare, automobiles, aviation, critical infrastructure and smart [Read More...]

Zero to ECDH (Elliptic-Curve Diffie-Hellman) in 30 Minutes

August 18, 2014 by Geoff Blaine
This is a quick primer on the elliptic-curve Diffie-Hellman (ECDH) key-agreement scheme. It provides a simple illustration of how the properties of elliptic-curve cryptography (ECC) can be used to build a useful security scheme. A key agreement scheme is a procedure by which two or more parties agree upon a value from which they can [Read More...]

Entrust Cloud Partner Program – SSL Reseller Program

August 7, 2014 by Geoff Blaine
With one of the best SSL reseller programs available, Entrust is ready to be your trusted partner. We make it simple and profitable to offer your customers proven SSL, device and specialty digital certificates — all from a trusted name in security. Entrust provides a flexible partner program to fit the goals of your company. [Read More...]

Strong Identity Authentication for First Responders

May 1, 2014 by Geoff Blaine
As stated by the U.S. Department of Homeland Security, “Local and state emergency response officials must be able to collaborate to ensure public safety. However, for this to happen, many identity management challenges must be overcome. While federal agencies are rapidly deploying secure common identification standards based on guidance from the White House and other [Read More...]

Infographic – Device Certificates: Identity Authentication in a Mobile World

April 9, 2014 by Geoff Blaine
How Device Certificates Secure our Mobile Identities