Relevant Items
Filter Results expand_more
Authentication clear
Blog add
Authors add
Solutions add
Products add
Product Categories add
157 Results
Blog

Gartner and Entrust Datacard explain why Trust is critical to your business

By Jacquelyn Painter

January 03, 2018

Whether it’s managing multiple users, eliminating calls to the help-desk, removing friction and frustration or simply not having enough resources to get it all done – TRUST needs to be at the foundation of your strategy. 
Blog

Grandma, what big eyes you have! I’m going to have to ask you for a retinal scan to confirm your identity…

By Sandra Carielli

January 12, 2017

Context based factors and behavioral analytics look at how a user is acting in the system, be it location, device fingerprint, typing patterns, touchscreen movements or other actions – if the user’s behavior deviates from their “normal behavior” enough, the system requests an additional (step up) authentication, just to confirm that the user is still who they claim to be. Applying context and behavioral analytics to authentication balances user convenience (the user doesn’t have to authenticate constantly) with security (but they do have to authenticate if something seems different). The classic challenge in integrating behavioral analytics with authentication is tuning.
Blog

What type of authentication is best for GDPR compliance?

By Tim Moses

August 16, 2017

The renewed focus on privacy prompted by the GDPR provides an opportunity for businesses to rethink how they interact with their users (whether employees, contractors, partners, or customers), pushing the needs of the user to the forefront.
Blog

How to Do Digital Business Right

By Jacquelyn Painter

March 14, 2017

A successful digital business strategy requires security AND enablement. If you want to be bold, and offer innovative products, solutions and services, you need to make sure you start by mitigating risks. Establishing trust through digital identity and authentication with advanced capabilities will ensure that you provide a secure foundation for digital business success. And since analyst warn that up to 40 percent of all digital initiatives will fail due to mismanagement of identity-related requirements – we have outlined five fail-proof tactics you can do to increase your chances of digital success.
Blog

Trusted identities and the Impact of the EU’s General Data Protection Regulation

By Ian Wills

June 16, 2017

A significant event will take place next year when a new data protection regime comes into force in Europe, replacing its 20-year-old predecessor. The new regime is called the General Data Protection Regulation (GDPR). 
Blog

Enterprise Authentication Comes to the Cloud: Introducing Our Newest Solution, IntelliTrust

By Mike Byrnes

July 19, 2017

IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 
Blog

Why the Future of Authentication Doesn’t Involve Passwords

By Ryan Zlockie

September 20, 2017

Single authentication provided by passwords is no longer sufficient for keeping data and identities safe.
Blog

Ovum Report on Cloud-Based Authentication

By Jacquelyn Painter

December 13, 2017

In order to ensure IT agility, cloud-based authentication is a requirement. 
Blog

What can the Equifax and other website breaches teach us about good security habits?

By Jason Soroko

September 05, 2017

Are there good habits to help web developers build their web sites more securely?  Let’s consider some lessons learned from two recent website breaches.  
Blog

Talking Trust Podcast Series

By Jacquelyn Painter

December 20, 2017

We have partnered with leading industry experts in banking and identity to deliver a podcast series that addresses some of the challenges financial institutions are experiencing.
Page 1 of 16