Relevant Items
Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
40 Results for 'Authentication'
Blog

Ovum Report on Cloud-Based Authentication

By Jacquelyn Painter

December 13, 2017

In order to ensure IT agility, cloud-based authentication is a requirement. 
Blog

Redefining Authentication: The New Use Cases

By Jacquelyn Painter

December 08, 2017

Authentication needs are changing. Passwords don’t cut it anymore. The digital transformation of business requires a new set of practices for modern identity. 
Blog

Why the Future of Authentication Doesn’t Involve Passwords

By Ryan Zlockie

September 20, 2017

Single authentication provided by passwords is no longer sufficient for keeping data and identities safe.
Blog

Strong authentication I can really have it all

By Entrust Datacard

September 05, 2017

Over the last few years, we have all seen what happens when IT professionals underestimate the risk of a data breach, and choose an authentication solution that is poorly suited to protecting sensitive information...
Blog

Countdown to VMworld

By Kathleen Nolan

August 21, 2017

At VMworld, Entrust Datacard will present our authentication, mobile derived PIV credential and PKI solutions as well as demonstrate our joint solution with VMware that enable users to authenticate for secure access to sensitive information and applications from mobile devices.
Blog

What type of authentication is best for GDPR compliance?

By Tim Moses

August 16, 2017

The renewed focus on privacy prompted by the GDPR provides an opportunity for businesses to rethink how they interact with their users (whether employees, contractors, partners, or customers), pushing the needs of the user to the forefront.
Blog

Enterprise Authentication Comes to the Cloud: Introducing Our Newest Solution, IntelliTrust

By Mike Byrnes

July 19, 2017

IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 
Blog

New Report: Securing Your Business with PKI

By Matt Hur

June 15, 2017

As the system of policies, procedures and roles that provide and regulate digital signatures and public-key encryption, PKI is vital to ensuring proper authentication doesn’t fall in the wrong hands.
Blog

How to Do Digital Business Right

By Jacquelyn Painter

March 14, 2017

A successful digital business strategy requires security AND enablement. If you want to be bold, and offer innovative products, solutions and services, you need to make sure you start by mitigating risks. Establishing trust through digital identity and authentication with advanced capabilities will ensure that you provide a secure foundation for digital business success. And since analyst warn that up to 40 percent of all digital initiatives will fail due to mismanagement of identity-related requirements – we have outlined five fail-proof tactics you can do to increase your chances of digital success.
Blog

Grandma, what big eyes you have! I’m going to have to ask you for a retinal scan to confirm your identity…

By Sandra Carielli

January 12, 2017

Context based factors and behavioral analytics look at how a user is acting in the system, be it location, device fingerprint, typing patterns, touchscreen movements or other actions – if the user’s behavior deviates from their “normal behavior” enough, the system requests an additional (step up) authentication, just to confirm that the user is still who they claim to be. Applying context and behavioral analytics to authentication balances user convenience (the user doesn’t have to authenticate constantly) with security (but they do have to authenticate if something seems different). The classic challenge in integrating behavioral analytics with authentication is tuning.
Page 1 of 4