Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
23 Results for 'access'
Blog

By Mike Moir

December 19, 2018

This gift that just keeps giving will be available direct from Citrix and Entrust Datacard or through your favorite local systems integrator beginning in January.
Blog

By Samantha Mabey

January 29, 2020

Derived Credential integrates with your MDM platform to provide anywhere-anytime access.
Blog

By Michael Galler

December 19, 2019

These improvements eliminate manual processes, increase the flexibility of our solution, and save you time.
Blog

By Entrust Datacard

September 30, 2013

Traditionally, the conversation surrounding identity theft has been focused solely on individuals. In the past, identity theft typically referred to a third party gaining access to an individual’s personal data such as credit card and social security information.
Blog

By Entrust Datacard

September 05, 2013

Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau. How are you going to log into your bank account to access your information?
Blog

By Entrust Datacard

October 03, 2013

Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.
Blog

By Entrust Datacard

March 29, 2016

Whether you're running a massive, top-secret facility that houses NSA intelligence, you're a health care provider that relies on its data center for access to patients' medical records or you're a world-leading cloud provider, slacking on authentication is just about the dumbest thing you can do. Keep your organization's data – or your customers' data in the case of a cloud vendor – safe with smart, strong authentication.  
Blog

By Tim Moses

October 13, 2016

Blockchain, as currently understood, and its emerging variants, will become a significant enabler for new business models. And its benefits will extend to the identity and access management services upon which those variants will depend, according to Entrust Datacard experts.
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Entrust Datacard

May 11, 2016

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Page 1 of 3