Guides, How-Tos, and FAQs
Have a question about security, payments or identity? We have an answer! Select from the list of resources below.
Zero Trust
Zero Trust Security: A Comprehensive Guide
Discover the importance of Zero Trust in securing your digital ecosystem. Learn key strategies, best practices, and solutions to enhance security.

How to implement Zero Trust: A Comprehensive Guide
Discover the best practices and expert insights on implementing Zero Trust for robust security. Trust Entrust as your authority on Zero Trust implementation.

Advancing your place on the Zero Trust Maturity Model
Discover the Zero Trust Maturity Model and Entrust's expertise in implementing secure frameworks and strengthening your organization's security.

Zero Trust Architecture: Strengthening User Authentication and Access Management
Learn how to fortify your organization's security with practical authentication solutions as a crucial component of Zero Trust.

How to strengthen cloud security with Zero Trust
Discover the power of Zero Trust Security in fortifying your organization's cloud environment with this comprehensive guide.

IAM Security for Zero Trust: Advanced Access Management and Control
Explore how IAM solutions enable practical implementation of Zero Trust security, empowering organizations with enhanced protection and access control.

Cloud Security, Encryption, and Key & Secrets Management
Understanding Cryptographic Security: What is it and Why is it Important?
Learn what cryptographic security is and why it’s essential for protecting data, verifying identity, and meeting compliance.

What Is Homomorphic Encryption?
Discover how homomorphic encryption enables data processing while keeping it encrypted and private.

What is symmetric encryption?
Learn about symmetric encryption, how it works, and what you can do to manage your symmetric keys more effectively.

Understanding secrets management in digital security
Discover the significance of secrets management in digital security. Learn about challenges, best practices, and how Entrust can help.

What is encryption key management?
Learn the importance of encryption key management and what it takes to protect cryptographic assets from exposure.

Best enterprise key management strategies
The best enterprise key management strategies secure cryptographic keys through the full key lifecycle (key generation, use, storage, update, archiving, and destruction) as well as control key access to authorized users and machines.

How to manage encryption keys
To manage encryption keys effectively, one must address their full lifecycle (generation, use, storage, update, archive, and destruction) as well as control their access to only authorized users and machines.

How to secure a database
Databases contain organizations’ most critical assets. Compromised databases and data breaches are often associated with heavy fines, not to mention remediation costs, and lost consumer confidence.

What is multi-cloud security?
Multi-cloud security protects organizational data storage and computing assets everywhere - across multiple cloud services, including on-premises infrastructures that interoperate with the “cloud-native” components that were initially developed or born in the cloud-based environment.

A comprehensive guide to private key encryption
Learn about the advantages and limitations of private key encryption, plus its various applications and risk factors.

Compliance
Exploring NIS2: Changes, Requirements, and Preparation
Discover the key aspects of the new NIS2 Directive, its main changes compared to NIS1, and how to comply with its requirements.

Understanding the Digital Operational Resilience Act (DORA)
What is DORA? Learn about the Digital Operational Resilience Act and discover solutions to ensure DORA compliance.

What is the eIDAS regulation?
Learn more about your eIDAS compliance requirements and how to navigate them with a strong root of trust.

What is GDPR?
What is the General Data Protection Regulation (GDPR)? Learn about GDPR, the most comprehensive data privacy standard to date.

The Ultimate Guide to CMMC
Learn more about Cybersecurity Maturity Model Certification (CMMC) and the latest updates to the program for DoD compliance.

What you need to know about PSD2 regulation and compliance
Discover everything you need to know about PSD2, including what it is, why it’s important, and what you can do to simplify compliance.

What is Common Criteria?
Discover the significance of Common Criteria and how using a certified product can help you meet your security and compliance requirements.

What is CCPA?
The California Consumer Privacy Act (CCPA) is a state statute signed into law in 2018 with the intent of enhancing privacy rights and consumer protection for residents of the state. Learn more!

CCPA vs GDPR Compliance Comparison
Here are some frequently asked questions about the similarities and differences between the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

What is FIPS 140-2?
Learn what the Federal Information Processing Standard (FIPS) is and why this U.S. and Canadian Government standard is so important around the world.

What is FIPS 140-3?
Learn what the Federal Information Processing Standard (FIPS) is - specifically 140-3 - and why this U.S. and Canadian Government standard is so important around the world.

eIDAS 2: Everything you need to know
Discover the facts about eIDAS 2, how the regulation has changed, and what you can do to achieve and maintain eIDAS compliance.

What is data sovereignty?
Explore the concept of data sovereignty, its significance for businesses, and how to ensure compliance.

Understanding India’s Digital Personal Data Protection Act (DPDPA)
Explore the Digital Personal Data Protection Act (DPDPA) and how to prepare your organization for compliance.

Mastering the Essential Eight Maturity Model
Learn about the Essential Eight Maturity Model and how to implement its baseline mitigation strategies.

Digital Cards
The Ultimate Guide to Digital Account Opening
Learn how a simple and convenient digital account opening process offers customers an optimal banking experience with this in-depth guide.

What is eKYC?
Learn why eKYC is crucial for businesses and how it enhances customer onboarding while ensuring privacy and compliance.

A Comprehensive Guide to Digital Payments
Digital payments allow users to pay for a purchase without a physical card or currency. Learn how Entrust can help you meet surging demand.

Electronic and Digital Signing
Electronic Signature: A Comprehensive Guide
Discover how to elevate your signing process with electronic signatures for a more secure, fast, and frictionless experience.

What is a digital signature?
Explore the world of digital signatures and understand their significance in securing electronic transactions.

Digital signature vs electronic signature
The difference between electronic and digital signature is that a digital signature leverages a digital certificate issued by a certification authority, while an electronic signature has a broader definition.

What is code signing?
Code signing certificates assures end users that software has not been tampered with when downloading executable program files.

What are digital signing, digital certificates and time stamping?
Learn what digital signing, certificates, and time stamping are and how they are important to security.

What is BIMI?
BIMI, Brand Indicators for Message Identification, is an emerging standard for inserting registered trademarks inside email clients that makes it simple for organizations to display their brand on emails.

What is an encrypted email?
An encrypted email is a method in which the sender of the email can ensure that only the recipient will be able to read the content of the message.

How to sign a Word document
This resource explains how to sign a Word document using an Entrust digital certificate called Document Signing certificate.

Hardware Security Modules (HSMs)
What Is A Hardware Security Module (HSM)?
Learn what Hardware Security Modules (HSMs) are and why they are used to secure cryptographic processes and help organizations meet compliance standards.

Everything You Need to Know About Encryption
Learn the basics of encryption, including why it’s important, how it works, and what you can do to implement an effective cryptographic security posture.

Everything you need to know about 5G security
Dive into 5G tech and network security. Learn deployment, vulnerabilities, and evolving cyber threats for a fortified 5G ecosystem.

How to prevent security breaches in healthcare
Prevent security breaches in healthcare by protecting data in Electronic Health Record (EHR) systems, complying with the Health Insurance Portability and Accountability Act (HIPAA) and safeguarding IoT devices.

What is Bring Your Own Key (BYOK)?
Learn what Bring Your Own Key (BYOK) is and how BYOK enables migration to public cloud service providers and cloud data security.

What is a cloud HSM?
Learn what a cloud hardware security module (HSM) is and how a cloud HSM can deliver the same cryptographic functionalities as on-premises HSMs.

What is data encryption?
Data encryption is a way of translating data from a plaintext, or unencrypted version, to cyphertext, or an encrypted version.

What is Root of Trust?
Gain insight from Entrust on Root of Trust and how Root of Trust schemes are inherently trusted and must be secure by design.

Are there virtual HSMs?
No, there is no such thing as a virtual HSM. Virtual means “not physical” and the H in HSM stands for “hardware,” the physically secure form factor that helps make HSMs so secure.

Identity and Access Management (IAM)
What is IAM? (Identity and Access Management)
Dive into the world of Identity and Access Management (IAM) with this comprehensive guide.

Authentication: A Guide to Strong and Secure Access Management
Dive into the world of authentication and explore user identity verification, methods, and factors enhancing access security.

What is Identity as a Service?
Discover the cloud-based IAM model, its capabilities, benefits, and how Entrust ensures trusted identities and Zero Trust security.

What is multi-factor authentication (MFA)?
Learn about multi-factor authentication (MFA) and how it can help your organization protect workforce, consumer, and citizen identities.

What is two-factor authentication (2FA)?
Discover why 2FA is needed, how it works, examples of 2FA methods, and how to implement it for your organization.

Single sign-on (SSO)
Learn the basics of single sign-on (SSO), why it’s important, and how Entrust can help secure your SSO implementation.

Authentication vs. authorization
Learn more about the difference between authentication and authorization and why both are important steps in the authentication process.

Best practices to prevent data breaches
Learn steps to take and best practices you can implement to prevent a data breach or minimize data loss should a breach occur.

How does passwordless authentication work?
What is Passwordless authentication? It provides an alternative form of authentication (i.e. biometrics) to the password to enable secure user access.

Tips for securing cloud-based applications
Implement these five tips to secure cloud-based applications.

What is an identity provider?
Learn what an identity provider, or IdP administrator, is and how Entrust can help you manage digital identities.

Tips to choose the best Identity as a Service provider
The best Identity as a service providers offer cloud-based subscription with a Zero Trust framework and access management to reduce workload and scale fast.

What is a one-time password?
A one-time password (OTP) is a string of numbers and/or characters that is generated and sent to a user to be used for a single login attempt or transaction.

What is OAuth?
OAuth, or Open Authorization, is an open standard authorization protocol for access delegation. It is a secure method to allow users to grant service providers (i.e., websites and applications) access to their information without giving them their passwords.

What is role-based access control (RBAC)?
Role-based access control (RBAC) is an access control mechanism that defines roles and privileges to determine whether a user should be granted access to a resource.

What is SAML?
SAML provides user authentication via identity federation. This enables single sign-on (SSO) across different identity providers and service providers.

What is token-based authentication?
Token-based authentication protocols grant users a hardware or software token in exchange for their credentials.

Identity Verification
An Introduction to Digital Identity Verification
The identity verification market was valued at $11B in 2022. Learn more about the importance of digital identity verification and how it works.

Instant Financial Cards
Credit Card Printing Process
A credit card printer is used to create credit cards with essential information, security elements, and personalized features. Learn how Entrust can help.

What Are EMV Chips, Cards, and Printers?
Find answers to your questions about EMV chips, cards, and printers here, such as, ‘What is the importance of EMV?,’ ‘How does EMV work?,’ and ‘Is contactless the only form of EMV?’

Instant ID Cards
Guide to designing school ID cards
School ID cards are essential for providing trusted identities for students, faculty and staff.

What are PVC ID cards and printers?
Get answers to frequently asked questions about PVC ID card printers, such as, “What is PVC?” and “Why do we recommend PVC for ID card printers?”

Guide to understanding PVC ID cards & printers
PVC ID card printers use either dye sublimation or reverse transfer printing to function.

How do I choose the best ID card printer?
Get answers to questions around what to consider when purchasing an ID card printer such as, ‘Do I need a single-sided or dual-sided printer,’ and ‘What type of security features do I need.’

How to make custom employee ID badges
Designing a custom employee ID badge doesn’t need to be difficult, time consuming or expensive.

ID card security: Features & designs keeping your enterprise secure
ID cards can be designed with photographs, signatures, color-shifting designs, etc. to thwart ID card attacks.

What is a physical access control system (PACS) & why is it important?
A physical access control system (PAC) allows organizations to control who enters a physical space.

Post-Quantum Cryptography
Understanding post-quantum
Unlocking the Future of Data Security with Post-Quantum Cryptography: Explore the world of quantum computers, cryptographic algorithms, and encryption methods.

A comprehensive guide to quantum-resistant cryptography and encryption
Learn about the revolution of quantum computers, quantum-resistant cryptography, and how to safeguard your data from quantum attacks.

Harvest Now, Decrypt Later – Fact or Fiction?
Harvest Now, Decrypt Later assumes that classical encryption techniques applied to data today, to make it unreadable and unusable, will in the future be vulnerable to attack from post-quantum computers.

Public Key Infrastructure (PKI)
What is PKI?
Learn the power of public key infrastructure (PKI) and its role in protecting individuals and organizations from cyber threats.

What is a certificate authority?
Learn about certificate authorities, digital certificates, and how to find the right solution for your organization.

How to secure IoT devices
Learn what the Internet of Things (IoT) is, how to secure IoT devices and IoT security requirements.

PKI's role in device authentication
PKI (public key encryption) device authentication uses a digital certificate to verify user and device identity.

Symmetric vs. asymmetric encryption
See the two encryption methods defined, features compared, and examples to further illustrate their use in everyday applications.

Digital Certificates
What is TLS?
Learn the basics of Transport Layer Security (TLS) and how TLS certificates can help your organization build trust in the digital landscape.

What is HTTPS?
HTTPS is an implementation of TLS encryption on top of the HTTP protocol.
