Skip to main content

Blog Posts: Authentication

It All Starts with Identity July 2018 by Rajan Barara

Identity: the key factor when it comes to verifying who you are and what you…

How GDPR improves the user experience June 2018 by Jacquelyn Painter

There seems to be a misconception that added security regulations result in more friction, costs…

Leopard Spots and Zebra Stripes: Big Data and Identity Manag... June 2018 by Juan C. Asenjo

The expression “a leopard cannot change its spots” maintains that it is challenging to alter…

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analyt... June 2018 by Sandra Carielli

Did you know that every zebra has its own unique stripe pattern? Just like a…

Mobile Smart Credential Supports Today’s Most Popular Mobi... May 2018 by Mike Byrnes

Our award-winning Mobile Smart Credential application, which transforms your mobile phone into a virtual smart…

PSD2: Which door are you choosing? May 2018 by Jacquelyn Painter

PSD2 and open banking are forcing the banking sector to rethink their digital banking strategy….

All banks can leverage PSD2 insights May 2018 by Jacquelyn Painter

Only a few years ago — as a consumer — I was skeptical of purchasing…

Multi-factor authentication is a commodity play. What now? April 2018 by Rajan Barara

Soft tokens, Mobile push notification and one-time passwords (OTPs) combined with cloud and mobile have…

Entrust Datacard at RSA Conference 2018 March 2018 by Michelle Morgan-Nelsen

In less than six weeks, our digital identity evangelists will descend on the Moscone Center…

  • Sort by

  • Topic