Tag Archives: authentication

Entrust President Talks the Evolution of Identity with IT Harvest

April 22, 2014 by Entrust, Inc.     No Comments

What’s next for Entrust? Entrust president David Wagner sat down with IT Harvest’s Richard Stiennon at RSA Conference 2014 to discuss Entrust’s past, present and future role in security technology, and the state of the industry as a whole. Datacard Group Acquisition of Entrust After being acquired by Datacard Group in December 2013, integration of [Read More...]

Man Behind Second University of Maryland Data Breach Claims Positive Motive

April 21, 2014 by Entrust, Inc.     No Comments

A man said he carried out a breach on the University of Maryland to expose a bigger problem. 

Filed Under: Authentication, Encryption Tagged With: EW, Maryland

It’s a Tough Road For Businesses That Don’t Protect Their Identities

April 16, 2014 by Entrust, Inc.     No Comments

From the Target breach last year to the crop of new data attacks that have arisen in 2014, there are no shortage of threats to enterprise security on the web.

Filed Under: Authentication, Encryption Tagged With: enterprise security, EW

Did Google Miss the Mark With Push To Make Passwords Obsolete?

December 2, 2013 by Chris Taylor     No Comments

On Saturday, Forbes discussed Google’s 2014 vision to make user-generated passwords obsolete. It’s an initiative that deserves praise and is long overdue. Someone is finally taking strong authentication and identity-based security seriously — particularly in the consumer space. It does, however, come with some caveats. Google is demonstrating that identity-based security solutions are available for [Read More...]

Filed Under: Enterprise Authentication Tagged With: gmail, Google, passwords

The Way Forward

August 14, 2013 by Bill Conner     No Comments

The title may come across a little more literary than a normal technology or security blog, but this is what I want to discuss: the way forward in security software. Cybersecurity is a market in flux. And, from where I sit, the way forward is simple and hinges on three things. Mobile a key market [Read More...]

Filed Under: Cloud, Identity Assurance, Mobility Tagged With: Cloud, growth, innovation

What is Driving Growth in the Authentication Market?

August 8, 2013 by Bill Conner     No Comments

I recently read an article that pegged the global growth rate for multifactor authentication at 17 percent. This is a substantial compound annual growth rate (CAGR) when you take into consideration the size of the market and the nascent growth of some key players. Then I considered Entrust’s relative position in the market and in [Read More...]

Filed Under: Cloud, Identity Assurance, Mobility Tagged With: Cloud, growth, innovation

Mobile Smart Credentials — Multipurpose Digital Identities for improved Security AND User Convenience

October 24, 2012 by Mike Byrnes     No Comments

Today, Entrust announced the commercial release of the Entrust IdentityGuard Mobile Smart Credential — a solution that transforms a smartphone into a multipurpose digital identity.

A Framework Approach to Authentication and Identity & Access Management

May 23, 2012 by David Mahdi     No Comments

Around a decade ago, I remember thinking of what it would be like if vendors kept pumping out point solutions to solve each individual problem. Luckily, that trend is not as bad as I may have thought — although I still see many vendors pushing hard for individual point solutions. Is this truly what customers [Read More...]

Layered Security for Mobile Banking

May 8, 2012 by Mike Byrnes     No Comments

American Banker published a great article last week covering some of JPMorgan’s security strategies for mobile banking. Lloyd O’Conner explained the importance of layering multiple security technologies to protect their clients — as well as their own company — from the growing cyberthreats that not only target the online channel but are zoning in on [Read More...]

Filed Under: Fraud, Identity Assurance Tagged With: biometrics, Business, fraud

Authentication After the RSA breach: Sticking to Hard Tokens Could be a Mistake

September 20, 2011 by Bill Conner     No Comments

Blogmaster Note: This was originally posted on September 20, 2011 to the ComputerWorld UK Security Blog. The role of authentication as part of the CISO’s armory has been subject to some serious debate in recent months. In the wake of the RSA data breach, and the subsequent news of customers’ compromised data, the ability of [Read More...]