High-assurance workforce authentication
Entrust's passwordless solution creates a secure digital identity on the employee’s mobile phone using a PKI credential that is unlocked with biometric authentication, such as fingerprint or facial recognition. This ensures that the credential holder is, in fact, the credential owner, protecting workers’ digital identities and corporate assets. And, by replacing the password with a high-assurance passwordless solution, you are effectively blocking 80% of today’s attacks.
Here's how it works
There are no servers to manage or software to deploy. You simply use our cloud-based service to establish your policies and monitor activity on your networks.
Install a smart credential on an employee’s mobile device to create a secure digital workforce identity.
The worker unlocks the device with biometric authentication, such as fingerprint or facial recognition, to verify his or her identity.
Once the worker is authenticated, Bluetooth® connectivity to his or her Mac or PC computer delivers passwordless single sign-on to all apps – cloud-based and on-premises – while in close proximity.
When the worker walks away from their computer, he or she is logged out, or their workstation is locked, depending on the policy set by the worker’s organization.
Benefits of Passwordless Login
Focused Security Expertise
Entrust was first to market with passwordless, you can be confident that we're deploying proven passwordless solutions that define best practices in authentication.
Reduced Total Cost of Ownership
Our passwordless authentication capability works with the environment you have. You will save on the costs of resets, administration, and support.
Flexible Deployment Options
With Entrust, you decide if you want a cloud-based or on-prem solution for high-assurance credential-based passwordless authentication.
Request a demo today
An Entrust Identity portfolio specialist will be in touch with options soon.
Our identity portfolio capabilities:
The identity portfolio suited to your authentication needs
Meet PSD2 Regulations
We have the trusted identity tools you need to be successful and in compliance.