Skip to main content
88 Results

Adaptive Issuance Instant ID as a Service Case Study

Leading service provider improves ID issuance process with cloud-based Entrust Adaptive IssuanceTM Instant ID as a Service

Case Studies

folder icon
| May 17, 2021

Ghanian Gov’t Instantly Issues National IDs Using CD800 Printers

The NIA, via Identity Management Systems(IMS), a subsidiary of Margins ID Group andan Entrust partner, deployed almost 2,000Entrust CD800 Direct-to-Card ID Printerswith Card Lamination Module.

Case Studies

folder icon
| Aug 16, 2021

State Correctional Facility Enhances ID Card Program with CD800 Printer

A major correctional facility needed to replace its aging ID card printer, streamline the ID printing process, and implement a cost-effective laminating solution. The facility selected the Entrust CD8...

Case Studies

folder icon
| Aug 31, 2022

Interoperability of Bloombase StoreSafe and Entrust KeyControl for Data-at-Rest Encryption

This document describes the steps carried out to integrate Entrust KeyControl with Bloombase StoreSafe software appliance on VMware ESXi to deliver high bandwidth transparent storage encryption for m...

Guides

directional sign icon
| Sep 02, 2021

Bring Your Own Key for AWS Key Management Service and Entrust KeyControl

This document describes the integration of AWS Bring Your Own Key (referred to as AWS BYOK in this guide) with the Entrust KeyControl Key Management Solution (KMS).

Guides

directional sign icon
| Jul 01, 2022

Cohesity and Entrust KeyControl

This document describes how to configure and integrate Entrust KeyControl (KMS) with a Cohesity DataPlatform using KMIP.

Guides

directional sign icon
| May 27, 2022

Hitachi VSP G & E Series KeyControl Integration Guide

This document describes the integration of the Hitachi Virtual Storage Platform (referred to as VSP in this guide) with the Entrust KeyControl 5.5.1 (formerly HyTrust KeyControl) key management soluti...

Guides

directional sign icon
| Nov 01, 2022

Entrust KeyControl v10.0 - nShield HSM

This guide describes the procedure to integrate Entrust KeyControl and Entrust nShield HSM for establishing a hardware root of trust for all encryption keys. It also describes how the KeyControl Admin...

Guides

directional sign icon
| Jan 06, 2023

Entrust KeyControl v5.5.1 nShield HSM Integration Guide

This guide describes the procedure to integrate Entrust KeyControl and Entrust nShield HSM for establishing a hardware root of trust for all encryption keys. It also describes how the KeyControl Admin...

Guides

directional sign icon
| Jun 16, 2022

Entrust KeyControl v5.5 nShield HSM Integration Guide

This guide describes the procedure to integrate Entrust KeyControl and Entrust nShield HSM for establishing a hardware root of trust for all encryption keys. It also describes how the KeyControl Admin...

Guides

directional sign icon
| Jan 14, 2022