Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
21 Results for 'access'
Blog

By Mike Moir

December 19, 2018

This gift that just keeps giving will be available direct from Citrix and Entrust Datacard or through your favorite local systems integrator beginning in January.
Blog

By Entrust Datacard

July 14, 2015

As the transmission of information increases and businesses pursue more mobile-centered options, these developments create risks in addition to possibilities. But the vulnerabilities of an increasingly digital world can be mitigated via the implementation of centralized digital certificate management. As SSLShopper has pointed out, SSL certificates play a huge role in keeping data secure as it is in transit. The principle behind an SSL certificate is it that secures information so that the data being sent is only accessible to the specific recipient. This protects against the risks that could befall insecure data, such as information tampering and spying. In a typical enterprise workflow, privileged data is transmitted frequently. Without SSL, that information immediate becomes vulnerable. Here are three top reasons why SSL certificates are still vital for businesses:
Blog

By Entrust Datacard

July 27, 2015

Increasingly, government applications and services are moving to cyberspace, which provides citizens with more convenient means of accessing these resources. However, the growing use of cyber apps and service-based solutions among governments is prompting a question of security. In a threat-heavy age, how can governments ensure that citizens are protected as they access privileged services? This is a question that's facing national governments around the world.
Blog

By Entrust Datacard

November 09, 2015

It's no surprise that banks are a highly lucrative target for cybercriminals. After all, if you're a hacker scoping out your next victim, wouldn't you want to choose something that gives you the most direct access to money? As of November 3, there have been more than five million records breached so far this year within banking/credit/financial organizations, according to data compiled by the Identity Theft Resource Center. While one might think that only big banks are the targets, this is hardly the case. Sure, hacks like the JP Morgan incident — which led to U.S. authorities getting involved and arresting five suspects — are bound to get the most traction in the news. But in fact, hackers are looking to attack banks and credit unions operating at any scale. Here are just a few of the banking-based breach episodes that have already occurred in 2015:
Blog

By Entrust Datacard

October 14, 2015

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Blog

By Entrust Datacard

April 24, 2015

Just because RSA 2015 is over does not mean our conversations about security have to end. And even if you missed us in San Francisco, you can still access all the knowledge resources we presented. 
Blog

By Entrust Datacard

April 21, 2015

Stay safely connected today at the RSA Conference for the first full day of the 2015 RSA Conference. Learn how mobile devices are making security simpler. We’ve just announced a new push authentication capability for our Entrust® IdentityGuard Mobile Platform. You are a now able to securely access VPNs and websites from your mobile phone or tablet. 
Blog

By Entrust Datacard

December 17, 2015

The Malaysian National ID cards – MyKad – allows citizens to access a variety of service with just one card.
Blog

By Tim Moses

February 12, 2015

As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology. In parts one and two, we traced the early history of PKI and highlighted some of the challenges and innovations that shaped the technology. Today we look back at how patent issues and government involvement affected the continued development, access and adoption of PKI.
Blog

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Page 1 of 3