Entrust at RSA: Ready for Day 2

February 25, 2014 by Entrust, Inc.     No Comments

This entry is part 3 of 12 in the series Entrust at RSA 2014

RSA-10_social

Get ready to experience Identity: Evolved. The first full day of Entrust at RSA Conference 2014 is here. We’re bringing the perfect mixture of cloud coolness, must-have mobile security and I-need-that-today giveaways. More on that after today’s schedule below.

Tuesday, Feb. 25

Identity & Certificate Management from the Cloud — 11:30 a.m. PST
Rob MacDonald, Product Marketing Manger

Providing Flexibility & Choice with an Authentication Platform — 12:30 p.m. PST
Mike Moir, Product Marketing Manger

Secure Mobile is the New Enterprise Desktop — 1:30 p.m. PST
Kevin Vaudry, Product Marketing Manager

Secure Mobile is the New Enterprise Desktop — 2:30 p.m. PST
Kevin Vaudry, Product Marketing Manager

Identity & Certificate Management from the Cloud — 3:30 p.m. PST
Rob MacDonald, Product Marketing Manger

Leveraging Mobile to Protect Identity: What you Need to Know — 4:30 p.m. PST
Jason Soroko, Head of Malware Research

Pass the Hash: A Case of Identity Ambiguity — 5:30 p.m. PST
Jason Soroko, Head of Malware Research

The second point above get your attention? Good. We’re giving away some sweet prizes, including Apple iPad minis, the take-it-everywhere Bluetooth-powered Crasher portable speaker by JLab Audio and a whole slew of items for just showing up and saying hi.

Be sure you stop by the booth during our feature presentations for a chance to win. Learn about the evolution of digital identities. Take home epic prizes. A true win-win at Booth 2615. See you there.

Entrust at RSA Conference 2014 | Moscone Center | Booth 2615

Filed Under:
Tagged With:

About

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.

Add to the Conversation