• Infographic: Mapping the Path of Two-Factor Authentication

    Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset. By implementing an additional authentication wall, a company takes a vital proactive step toward making the business infrastructure safe from a malicious intrusion. However, there is an important distinction to be made between the two types of authentication tokens organizations use, as illustrated by an Entrust informational graphic:

        in Authentication
    0
  • Software Tokens: Simplifying Digital Security

    Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau.  How are you going to log into your bank

        in Identity Assurance, Mobility
    0