Relevant Items
Refine Search expand_more
Blog add
Solutions add
Products add
Product Categories add
18 Results for 'Authentication'

What type of authentication is best for GDPR compliance?

The renewed focus on privacy prompted by the GDPR provides an opportunity for businesses to rethink how they interact with their users (whether employees, contractors, partners, or customers), pushing the needs of the user to the forefront.

Enterprise Authentication Comes to the Cloud: Introducing Our Newest Solution, IntelliTrust

IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 

Strong authentication I can really have it all

Over the last few years, we have all seen what happens when IT professionals underestimate the risk of a data breach, and choose an authentication solution that is poorly suited to protecting sensitive information...

iCloud Hack Highlights Need For Strong Authentication

Entrust Datacard covers the fallout of another major data breach, this time affecting sensitive photos stored on celebrities' iCloud accounts. In the wake of the incident, Apple has released a statement calling the breach "a very targeted attack on user names, passwords and security questions," adding that "none of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find My iPhone."

Desktop Security: The Need for Second-Factor Authentication

When you are considering second-factor authentication technologies, be sure to match the strength of the technology to the risk level of the resource you are trying to protect. In a corporate environment, there is an even more important need for second-factor authentication. With almost any level of complexity, you may need to continue to use legacy authentication systems alongside stronger modern authentication.

Using Strong Authentication to Turn a Negative Experience to Positive

Entrust Datacard discusses how strong authentication and the instant issuance of payment cards can help take a negative experience and turn it to a positive one.

Entrust® IdentityGuard Virtual Appliance - Easy-to-Deploy, Turnkey Authentication Solution

Entrust Datacard introduced the company’s newest authentication solution, Entrust® IdentityGuard Virtual Appliance. The packaged, turnkey, two-factor authentication solution enables organizations to defend against these cyberattacks while empowering and increasing productivity for their IT departments. 

Achieving Identity Based Security in the Real World – Improved User Experience with Better Authentication

With the mass adoption and implementation of EMV cards, fraud is now moving from card-present transactions to online channels of card-not-present (CNP) fraud. Today, CNP fraud is the fastest growing type of fraud worldwide and occurs during online and mobile transactions

Speeding up customs with sensible authentication

Authentication, and specifically ePassport technology and biometric scanners, are hugely important to cybersecurity. But it's too early to fully assess whether or not automatic passport kiosks will save a significant amount of time in customs.

Bracing the Internet's backbone with stronger authentication

Whether you're running a massive, top-secret facility that houses NSA intelligence, you're a health care provider that relies on its data center for access to patients' medical records or you're a world-leading cloud provider, slacking on authentication is just about the dumbest thing you can do. Keep your organization's data – or your customers' data in the case of a cloud vendor – safe with smart, strong authentication.  
Page 1 of 2