Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.
Mobile Devices Empower Customers in Fight Against Fraud
Mobile, when implemented correctly, has the power to deliver unmatched security and user convenience, while also enabling new business processes that actually lead to delighting customers and engaging them in the fight against fraud.
Mobile World Congress Reflects Importance of Mobility
February 2013 was a busy month for Entrust. We exhibited at Mobile World Congress in Barcelona, Spain, while concurrently exhibiting at the RSA Conference in San Francisco.
Entrust at RSA: Secure Mobile, Leverage Mobile
During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.
Layered Security USING your Mobile Device
A natural extension to my last post, I find it interesting that most people intuitively see the need to secure mobile devices, applications and transactions, but they are likely unaware of the incredible power and convenience mobile devices present in terms of serving as a security device themselves. Increasingly, mobile devices are used for more [Read More...]
Applications – Public Transportation/Ticketing
This entry is part 5 of 5 in the series Consumerization & NFCPublic Transportation & Ticketing Impact: High Timeframe to mainstream: 2-5 years (with differing adoption rates regionally) In the above video, you can see the user purchase a ticket by tapping on a map. In many cities, ticket pricing is based on regions or [Read More...]
Cloud & Mobile: A “silky” match made in Amazon’s Heaven
Wow, did Jeff Bezos do a good job this past Wednesday! As many of you are guessing, I am referring to Amazon’s recent press event on Wednesday. Clearly, the battle for the e-readers and tablets market have gone super nova. Overall, I think Amazon will find a good product/market fit, and likely be a substantial [Read More...]
Are you into BYOD?
Today’s identities go well beyond people and how we traditionally think of identities. The number of people identities will be dwarfed in the next five years by device and application identities. How is your organization planning on dealing with the consumerization of the IT infrastructure?
Mobile as a Credential
I recently read an interesting article from Avisian – “Mobile as a Credential” by Zack Martin. The article definitely hit home, as it directly relates to what we have been researching and building at Entrust. The article comes at an interesting time, as we just launched IdentityGuard 10 & I conducted a joint webcast with [Read More...]
A graphic example of Mobile productivity. . . uhmm, sorry about the pun!
A couple of days ago I wrote a little piece on the growth of mobile devices in the enterprise, and then tied it to the release of Entrust identityGuard 10 – in a little bit of shameless corporate promotion. But hey, I’m in marketing and I get well compensated for doing just that! I had [Read More...]