Resources Archive - Entrust, Inc. 1-8 of 301

The Importance of CJIS Compliance

December 17, 2015 by Elizabeth Miller
There are many benefits of law enforcement-based data sharing. So many, in fact, that it might seem like there are no clear drawbacks. But there is one important thing to consider: If a pool of shared information is available to officers, it’s also potentially available to an entirely unwanted element – criminals. In our digital [Read More...]

Transforming the Banking Experience with Trusted Identities

December 2, 2015 by Elizabeth Miller
According to Goldman Sachs analysts, non-traditional digital banking “startups” are already jeopardizing around $4.7 trillion of the financial services industry’s business. Today’s financial consumers care less and less about the end products — highreturn deposit accounts or low-rate loans — and more and more about the simplicity, convenience and empowerment of the omni-channel consumer experience. Acquiring [Read More...]

Empowering eGovernment with Mobile Identity

November 30, 2015 by Elizabeth Miller
With eGovernment ecosystems growing more complex thanks to increased connectivity, mobile productivity and interoperability initiatives, traditional credentials — passwords, tokens and access cards — simply can’t keep up. Government agencies need a better solution to protect their ecosystems while empowering the productivity benefits of the connected workforce. Today, the anytime-anywhere connectivity of the smartphone makes [Read More...]

Trusted Identities in Today’s Connected Enterprises

November 30, 2015 by Elizabeth Miller
The proliferation of wireless networks combined with the rapid advancement in mobile device technology has radically transformed our world. Mobile computing is having a far greater, and far reaching impact, transforming everything we do. The core concept of security in the enterprise is identity. When it comes to verifying identity in order to gain access [Read More...]

Entrust Solutions: Mobile as the New Desktop

November 30, 2015 by Elizabeth Miller
Most knowledge workers have multiple mobile devices, and they know how to use them — to your benefit. The challenge is making devices, apps and information secure. Passwords and other transitional methods won’t work. The answer is strong user credentials bound to their Mobile Desktop for secure, frictionless business enablement.

Entrust Solutions: Entrust IdentityGuard Transaction Signing

November 30, 2015 by Elizabeth Miller
Internet banking, e-commerce and corporate web-based services provide customers and users with convenient, always-on access. However, increasing online banking and e-commerce Card Not Present fraud can place your business at risk in terms of customer trust, brand reputation and monetary loss. Securing transactions, while ensuring a positive customer experience and keeping IT costs in check [Read More...]

Entrust Solutions: Transforming the Consumer Experience

November 30, 2015 by Elizabeth Miller
Digital banking is nothing new — online banking has been around since the late 1980s, and even mobile banking is more than 15 years old. The real frontier is interconnecting these digital channels with the modern branch location to create a seamless omni-channel customer experience — empowering both retail and commercial banking customers with the [Read More...]

Entrust IdentityGuard Adaptive Authentication

November 30, 2015 by Elizabeth Miller
Traditional authentication methods get in the way of business. The resulting challenge becomes discovering how to implement controls that delight customers with their ease-of-use, but disappoint hackers thanks to top-level security. The solution is transparent identity-based security that grants frictionless user access.