Relevant Items
Refine Search expand_more
Access Control clear
Blog add
Solutions add
Products add
Product Categories add
15 Results

Taking a Holistic Approach for Government ID Card Programs

Entrust's industry experts breaks down the common misconceptions regarding print technologies as well as highlights other important factors to be considered for your program—such as card designs, card stock and laminates or secure overlays—to ensure you are making the best decision for your investment.

High Security ID Documents – Using the QSDC Framework

Determining the right mix of secure technologies to minimize risk can be challenging however, using the QSDC™ framework provides guidance for evaluating key trade-offs in designing a secure identification program. Entrust Datacard provides you with a framework articulates a step-by-step process for determining the right mix of quality, security, durability and cost (QSDC). 

The Leading Edge of Border Security

In an increasingly global market, people everywhere are moving freely across borders and around the globe at a rapid rate. In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. Another all-time high was set in 2013, and we’re on pace to break that record again. In the past decade, technology advancements have transformed consumer expectations.

Why Government Agencies Need To Adopt eIDs

Increasingly, government applications and services are moving to cyberspace, which provides citizens with more convenient means of accessing these resources. However, the growing use of cyber apps and service-based solutions among governments is prompting a question of security. In a threat-heavy age, how can governments ensure that citizens are protected as they access privileged services? This is a question that's facing national governments around the world.

The World's First Smart National Identity Card

The Malaysian National ID cards – MyKad – allows citizens to access a variety of service with just one card.

ID Cards to the Rescue

Entrust Datacard case study on the Severn Area Rescue Association (SARA), the largest independent lifeboat service in the U.K., providing inshore rescue boat and land search assistance to Severn Estuary.

Best practices for preventing bank breaches

It's no surprise that banks are a highly lucrative target for cybercriminals. After all, if you're a hacker scoping out your next victim, wouldn't you want to choose something that gives you the most direct access to money? As of November 3, there have been more than five million records breached so far this year within banking/credit/financial organizations, according to data compiled by the Identity Theft Resource Center. While one might think that only big banks are the targets, this is hardly the case. Sure, hacks like the JP Morgan incident — which led to U.S. authorities getting involved and arresting five suspects — are bound to get the most traction in the news. But in fact, hackers are looking to attack banks and credit unions operating at any scale. Here are just a few of the banking-based breach episodes that have already occurred in 2015:

Why retailers should be thankful for EMV

The days after Thanksgiving are among the biggest for retailers in the United States. In particular, Black Friday (the day after Thanksgiving), Small Business Saturday (the day after Black Friday) and Cyber Monday (the first Monday after Thanksgiving) are three of the most prolific times of the year for businesses of all sizes. According to the National Retail Foundation, close to 136 million people plan on making a purchase at some point during the weekend after Turkey Day.

Protecting Data in Transit Versus at Rest

Securing data in transit is essentially securing data as it passes over a network. The challenge here is that the IP suite is full of protocols – HTTP, FTP and Telnet, to name a few of the most commonly used ones – that transmit data in plaintext, which means that there is the possibility of someone monitoring or intercepting messages and being able to read their contents. 

Achieving Identity Based Security in the Real World – Improved User Experience with Better Authentication

With the mass adoption and implementation of EMV cards, fraud is now moving from card-present transactions to online channels of card-not-present (CNP) fraud. Today, CNP fraud is the fastest growing type of fraud worldwide and occurs during online and mobile transactions
Page 1 of 2