Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
88 Results for 'Identity'

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 

By Juan C. Asenjo | Thales eSecurity Global Partner Marketing

June 19, 2018

Big data analytics enables a new behavior-based authentication evolution for easier and more robust identity management. 

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?

By Entrust Datacard

April 23, 2013

I recently read an interesting article by Ericka Chickowski, “Facebook vs. Salesforce: An Identity Smackdown?” at Dark Reading.

By Entrust Datacard

April 20, 2016

Entrust Datacard introduced the company’s newest authentication solution, Entrust® IdentityGuard Virtual Appliance. The packaged, turnkey, two-factor authentication solution enables organizations to defend against these cyberattacks while empowering and increasing productivity for their IT departments. 

By Entrust Datacard

October 03, 2013

Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.

By Mark Reeves

February 10, 2014

The Bank of England (BoE) recently simulated a major cyber-attack against the British financial system that yielded some disturbing results: many of the UK’s largest financial institutions are unprepared for large-scale online identity-based attacks.

By Jacquelyn Painter

October 16, 2018

Did you know that 53% of firms use four or more types of authentication to identify internal users?

By Diana Gruhn

March 05, 2019

Essentially an SSL/TLS certificate is a form of digital identity for your website. The level of identity differs depending on the type of certificate that you have.

By Entrust Datacard

April 03, 2014

Part two of a two-part blog feature from Entrust focused on safeguarding personal and enterprise Identity to protect against attack, and how stronger authentication practices can help businesses understand where such attacks are coming from and how to prevent them. For this reason, it is necessary for all organizations to guard identities with strong authentication measures.
Page 1 of 9