Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
28 Results for 'devices'

Ensuring a Trusted Internet of Things

By Jason Soroko
June 16, 2016
A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. From passwords, to certificates and analytics, there have been a number of techniques that have evolved over the years to establish and manage identity. 

Building Your Digital DNA: PKI and the Identity Evolution

By Sandra Carielli
September 29, 2016
n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?

Leveraging the Mobile Platform for Multi-Factor Authentication

By Entrust Datacard
January 13, 2016
Last week, Jason Soroko, manager, security technologies for Entrust Datacard was featured by SecureID News as part of their 2016 expert panel. In his article, Jason talked about the importance of multi-factor authentication and how mobile devices are playing a critical role in multi-factor authentication. 

How to Enhance Mobile Security in Health Care Organizations

By Entrust Datacard
May 11, 2016
In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased

Countdown to VMworld

By Kathleen Nolan
August 21, 2017
At VMworld, Entrust Datacard will present our authentication, mobile derived PIV credential and PKI solutions as well as demonstrate our joint solution with VMware that enable users to authenticate for secure access to sensitive information and applications from mobile devices.

Impact of ROCA on SSL

By Bruce Morton
October 23, 2017
Return of Coppersmith’s Attack (ROCA) is a vulnerability in the generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips. The vulnerability is present in NIST FIPS 140-2 and CC EAL 5+ certified devices since at least the year 2012.

Secure Industrial Control Systems

By Jason Soroko
February 21, 2017
OT/IT Convergence and the Need for Secure Device Ecosystems OT has been around a long time and has specific needs and constraints. ICS systems are indeed under attack and there is a need for comprehensive security. Security based on managed identities should be an important part of a defense-in-depth strategy in ICS. Uniquely identifying, authenticating, authorizing those devices and securing the data are ideas that are shared by federal guidance and international regulation. When choosing a partner to help secure your industrial control systems, seek a long term partner who understands the unique needs of OT environments. You can find out more about how we are helping to secure the industrial IoT ecosystem by viewing our infographic.

HARMAN Partnership Raises Awareness About IoT Security

By Ranjeet Khanna
September 25, 2017
The Internet of Things (IoT) demands the need to safeguard data between devices, sensors, and backend platforms connected within an IoT ecosystem.

Securing the Automotive IoT Ecosystem

By Jason Soroko
March 09, 2017
ioTrust provides managed identity security for vehicle devices, applications and drivers. Click here to see how we are working to secure the automotive industry.

Enterprise Authentication Comes to the Cloud: Introducing Our Newest Solution, IntelliTrust

By Mike Byrnes
July 19, 2017
IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 
Page 1 of 3