Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
21 Results for 'access'
Blog

By Mike Moir

December 19, 2018

This gift that just keeps giving will be available direct from Citrix and Entrust Datacard or through your favorite local systems integrator beginning in January.
Blog

By Entrust Datacard

September 30, 2013

Traditionally, the conversation surrounding identity theft has been focused solely on individuals. In the past, identity theft typically referred to a third party gaining access to an individual’s personal data such as credit card and social security information.
Blog

By Entrust Datacard

September 05, 2013

Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau. How are you going to log into your bank account to access your information?
Blog

By Entrust Datacard

October 03, 2013

Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.
Blog

By Entrust Datacard

April 16, 2014

The cybersphere is not kind to companies that don't take measures to protect themselves -- and their customers -- from attack. A recently released infographic from Imprima does not paint a pretty picture of the state of enterprise security. Businesses have the power to prevent themselves from getting breached. One of the answers lies in identity-guarding options like two-factor authentication, which functions to ensures only authorizes users are accessing company networks, applications, servers and more. Entrust experts say there is no telling when a malicious force will try to breach a company. But when it happens, the smart play is to be prepared.
Blog

By Rajan Barara

July 02, 2018

There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Blog

By Entrust Datacard

May 11, 2016

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Blog

By Entrust Datacard

April 05, 2016

It has become more apparent, and more expected, that consumers have the ability to access and transact with their financial institution through any channel, at any time and based on individual needs and preferences. Mike Brynes, industry expert for Entrust Datacard, discusses how embracing new approaches to authentication, security can be greatly enhanced while streamlining the user experience. 
Blog

By Kathleen Nolan

August 21, 2017

At VMworld, Entrust Datacard will present our authentication, mobile derived PIV credential and PKI solutions as well as demonstrate our joint solution with VMware that enable users to authenticate for secure access to sensitive information and applications from mobile devices.
Blog

By Entrust Datacard

July 14, 2015

As the transmission of information increases and businesses pursue more mobile-centered options, these developments create risks in addition to possibilities. But the vulnerabilities of an increasingly digital world can be mitigated via the implementation of centralized digital certificate management. As SSLShopper has pointed out, SSL certificates play a huge role in keeping data secure as it is in transit. The principle behind an SSL certificate is it that secures information so that the data being sent is only accessible to the specific recipient. This protects against the risks that could befall insecure data, such as information tampering and spying. In a typical enterprise workflow, privileged data is transmitted frequently. Without SSL, that information immediate becomes vulnerable. Here are three top reasons why SSL certificates are still vital for businesses:
Page 1 of 3