Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
29 Results for 'Opera'

Choosing Your Trust Model: Policy and Other Public and Private Trust Considerations, Part 1

By Sandra Carielli
November 10, 2016
Public trust, private trust, or a combination of the two? What do the different options mean, and what are the considerations around each? In a public-key-based authentication system, the policy authority plays a critical role: it dictates the rules by which the system operates, and therefore, the level of assurance it achieves.

PROVE IT: How Identity Verification Is Making the Internet a Safer Place

By Stephen Demone
April 25, 2016
Around the clock verification agents worldwide make sure that certified websites are owned and operated by legitimate, trustworthy businesses and people. Working together by establishing rules and guidelines for certificate issuance, SSL Certificate vendors make the internet a safer place to communicate, to do business and to socialize. 

PROVE IT: Can One Certificate Authority Be More Reliable Than Another?

By Stephen Demone
August 09, 2016
Companies like Entrust Datacard issue thousands of Certificates a year and have to make sure that they are issued to the correct identity every single time. As our world operates with many checks and balances to make sure we have a stable society, CAs are the checkers and balancers of digital identities. 

PKI: On-Premise versus Managed Service Debate

By Aaron Davis
August 17, 2017
Organizations can deploy and manage their own PKI or use a hosted PKI operated by a managed service provider. In this post, we’ll walk you through the key considerations to be aware of when choosing on-premises versus managed PKI service.

Connecting at CES 2017

By Kathleen Nolan
January 03, 2017
One of Entrust Datacard's strategic partners, HARMAN International, presenting on IoTrust at CES 2017. The IoTrust solution is designed to securely enable convergence between enterprise IT and operational technologies (OT) and help transform physical entities to digital assets, extending the value of core business. By partnering with HARMAN International we are combining a unique mix of disciplines to bring to market solutions that are secured by design to unlock the value of digital business.

We put a Smart Card inside a mobile device

By Mike Moir
August 21, 2018
Mobile devices have empowered users and become an integral part of our daily lives. And behind the scenes, customization around apps, operating systems and device formats have been created to match every preference — for us — the users. 

Preparing for Quantum Computing

By Diana Gruhn
November 07, 2019
Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to break the RSA and ECC cryptographic algorithms that are currently in use, many are operating under the assumption that this can happen within a 10-15 year timeframe.

CARTES America: Effective EMV Migration by Financial Issuers through Instant Issuance

By Entrust Datacard
April 03, 2013
As the financial industry experiences major change — including the adjustments the recent announcements to accelerate EMV chip migration in the U.S. by 2015 – banks are being forced to re-evaluate their business strategies to minimize costs and increase efficiencies and innovations in their card operations.

Self-Signed Certificates don’t deliver Trust

By Bruce Morton
April 04, 2013
We’ve heard the argument that website operators could just use self-sign certificates. They are easy to issue and they are “free.” Before issuing self-signed certificates, it’s a good idea to examine the trust and security model. You should also compare self-signed certificates to the publicly trusted certification authority (CA) model; and then make your own decision.

Deploying a Critical Infrastructure Protection Solution with OT and IT

By Entrust Datacard
August 05, 2013
Apart from one another, information technology (IT) and operational technology (OT) are two separate entities that perform different functions. But together, they make up the backbone of a nation’s security and economic stability—both in the private and public sectors.
Page 1 of 3