Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
88 Results for 'Identity'
Blog

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Blog

By Juan C. Asenjo | Thales eSecurity Global Partner Marketing

June 19, 2018

Big data analytics enables a new behavior-based authentication evolution for easier and more robust identity management. 
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Entrust Datacard

April 23, 2013

I recently read an interesting article by Ericka Chickowski, “Facebook vs. Salesforce: An Identity Smackdown?” at Dark Reading.
Blog

By Entrust Datacard

April 20, 2016

Entrust Datacard introduced the company’s newest authentication solution, Entrust® IdentityGuard Virtual Appliance. The packaged, turnkey, two-factor authentication solution enables organizations to defend against these cyberattacks while empowering and increasing productivity for their IT departments. 
Blog

By Entrust Datacard

October 03, 2013

Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.
Blog

By Mark Reeves

February 10, 2014

The Bank of England (BoE) recently simulated a major cyber-attack against the British financial system that yielded some disturbing results: many of the UK’s largest financial institutions are unprepared for large-scale online identity-based attacks.
Blog

By Jacquelyn Painter

October 16, 2018

Did you know that 53% of firms use four or more types of authentication to identify internal users?
Blog

By Diana Gruhn

March 05, 2019

Essentially an SSL/TLS certificate is a form of digital identity for your website. The level of identity differs depending on the type of certificate that you have.
Blog

By Entrust Datacard

April 03, 2014

Part two of a two-part blog feature from Entrust focused on safeguarding personal and enterprise Identity to protect against attack, and how stronger authentication practices can help businesses understand where such attacks are coming from and how to prevent them. For this reason, it is necessary for all organizations to guard identities with strong authentication measures.
Page 1 of 9