Tag Archives: strong authentication

Entrust at RSA: Providing Flexibility, Choice with an Authentication Platform

February 26, 2014 by Entrust, Inc.     No Comments
This entry is part 7 of 12 in the series Entrust at RSA 2014

This entry is part 7 of 12 in the series Entrust at RSA 2014 Aren’t enterprises and other security-conscious organizations tired of bolting on single point solutions in hopes of solving many different security challenges? What if threats evolve quicker than they do? What if authenticators are compromised? All this week at Entrust’s Identity: Evolved [Read More...]

Entrust at RSA: Two for Two at SC Awards 2014

February 26, 2014 by Entrust, Inc.     No Comments
This entry is part 8 of 12 in the series Entrust at RSA 2014

This entry is part 8 of 12 in the series Entrust at RSA 2014 Hard work pays off. How do we know? SC Magazine honored Entrust with a pair of Reader Trust Awards during the SC Awards 2014 Tuesday night in San Francisco. Entrust TransactionGuard and Entrust IdentityGuard were honored as top products in the [Read More...]

Filed Under: General Tagged With: Fraud Detection, RSAC, SC Magazine

What’s on CISO’s minds?

July 13, 2011 by David Mahdi     No Comments

A few weeks ago, I attended an InfoSec conference in Brussels, Belgium – “Enterprise Security Exchange”.
Overall, it was a great conference, as I was able to have great discussions with CISO’s of many known and respected global organizations.

Filed Under: Identity Assurance, Mobility Tagged With: authentication, CIO, CISO

Mobile as a Credential

June 14, 2011 by David Mahdi     No Comments

I recently read an interesting article from Avisian – “Mobile as a Credential” by Zack Martin. The article definitely hit home, as it directly relates to what we have been researching and building at Entrust. The article comes at an interesting time, as we just launched IdentityGuard 10 & I conducted a joint webcast with [Read More...]

A Platform Approach to Authentication. . . ‘cause you just can’t keep changing things out!

June 7, 2011 by Scott Perry     No Comments

Last week I was pretty proud of myself when I came up with the term “Breach Speed” (See: “When things are moving just a little too quickly . . .  the whirlwind of data breaches” ); and I know my colleagues have had to live with me being a little more insufferable than usual , [Read More...]

I would be just as keen if the 5th Mobile Banking Summit was in Fargo. Honestly!

June 6, 2011 by Scott Perry     No Comments

For the past week or so I’ve posted a few things to the Enterprise Authentication blog (as an example, see:  Finally – I can bring my iPad to work) – but amongst us Auth & Fraud people that’s kind of like a fighter pilot flying a cargo plane. . .  it’s not that hard, but [Read More...]

A graphic example of Mobile productivity. . . uhmm, sorry about the pun!

June 3, 2011 by Scott Perry     No Comments

A couple of days ago I wrote a little piece on the growth of mobile devices in the enterprise, and then tied it to the release of Entrust identityGuard 10 – in a little bit of shameless corporate promotion. But hey, I’m in marketing and I get well compensated for doing just that!  I had [Read More...]

Biometrics and Mobile Security – Points to Ponder

May 12, 2011 by Mike Byrnes     2 Comments

Last week’s FS-ISAC Annual Summit in Miami was once again top notch. This is the second year Entrust has participated in the event which in my opinion, is one of the top venues for bringing financial security decision makers and industry experts together to discuss, debate, brainstorm and overall collaborate on the top information security [Read More...]

When it comes to me and Jude, I’m pretty sure I’d be willing to sacrifice a little security!

April 25, 2011 by Scott Perry     No Comments

So, Facebook has introduced what they term two-factor authentication to the social networking site!  I read a response from someone working for a large security company who said the company (I clicked on their handle and it linked me to Symantec)  “commends Facebook for broadening security options. . .” . To me, this is similar [Read More...]

Entrust Provides Expertise on Border Security, Malware Defense at Hong Kong INTERPOL Conference

September 15, 2010 by Karen Platt     No Comments

Entrust’s Mark Joynes spoke today at the first INTERPOL Information Security Conference (IISC) in Hong Kong. The three-day event, co-hosted by INTERPOL and the Hong Kong Police, addresses the importance of specific solutions that help solve critical border security challenges and defend against advanced malware attacks.