Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
27 Results for 'devices'
Blog

By Entrust Datacard

May 12, 2015

Securing computers in a company network should definitely be a priority for businesses of all types and sizes. But there's another element of the enterprise network that can't be overlooked: mobile devices. As companies make strides toward greater mobility — with employees increasingly logging in remotely and completing a mounting number of work-related tasks on mobile devices — the need to protect these mobile mechanisms becomes particularly acute.
Blog

By Entrust Datacard

April 21, 2015

Stay safely connected today at the RSA Conference for the first full day of the 2015 RSA Conference. Learn how mobile devices are making security simpler. We’ve just announced a new push authentication capability for our Entrust® IdentityGuard Mobile Platform. You are a now able to securely access VPNs and websites from your mobile phone or tablet. 
Blog

By Entrust Datacard

February 09, 2015

When we talk about hacking these days, we're not talking about something that's confined to computers and mobile devices only. Sure, the majority of cybercrime that's carried out currently revolves around these mechanisms, but with the global push toward the Internet of Things, the sphere of items and objects that could become vulnerable to hacks is growing broader.
Blog

By Jason Soroko

June 16, 2016

A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. From passwords, to certificates and analytics, there have been a number of techniques that have evolved over the years to establish and manage identity. 
Blog

By Sandra Carielli

September 29, 2016

n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

By Entrust Datacard

April 02, 2013

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned).
Blog

By Entrust Datacard

August 15, 2013

As the global workforce continues to mobilize, many processes that were once typically run from applications based on an internal server are now conducted with remote devices. IT executives, therefore, must count on such devices to provide adequate protection against any malicious activity that might interfere with critical business processes.
Blog

By Entrust Datacard

August 06, 2013

Whether it’s through the constant use of passwords, answering security questions online or verifying an address over the phone, most people understand the importance of authenticating identities. But this theory also is critical to verify the identities of mobile devices connecting and interacting with a secure network.
Blog

By Entrust Datacard

January 13, 2016

Last week, Jason Soroko, manager, security technologies for Entrust Datacard was featured by SecureID News as part of their 2016 expert panel. In his article, Jason talked about the importance of multi-factor authentication and how mobile devices are playing a critical role in multi-factor authentication. 
Blog

By Entrust Datacard

May 11, 2016

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Page 1 of 3