Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
27 Results for 'devices'
Blog

By Kathleen Nolan

August 21, 2017

At VMworld, Entrust Datacard will present our authentication, mobile derived PIV credential and PKI solutions as well as demonstrate our joint solution with VMware that enable users to authenticate for secure access to sensitive information and applications from mobile devices.
Blog

By Bruce Morton

October 23, 2017

Return of Coppersmith’s Attack (ROCA) is a vulnerability in the generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips. The vulnerability is present in NIST FIPS 140-2 and CC EAL 5+ certified devices since at least the year 2012.
Blog

By Ranjeet Khanna

September 25, 2017

The Internet of Things (IoT) demands the need to safeguard data between devices, sensors, and backend platforms connected within an IoT ecosystem.
Blog

By Jason Soroko

February 21, 2017

OT/IT Convergence and the Need for Secure Device Ecosystems OT has been around a long time and has specific needs and constraints. ICS systems are indeed under attack and there is a need for comprehensive security. Security based on managed identities should be an important part of a defense-in-depth strategy in ICS. Uniquely identifying, authenticating, authorizing those devices and securing the data are ideas that are shared by federal guidance and international regulation. When choosing a partner to help secure your industrial control systems, seek a long term partner who understands the unique needs of OT environments. You can find out more about how we are helping to secure the industrial IoT ecosystem by viewing our infographic.
Blog

By Jason Soroko

March 09, 2017

ioTrust provides managed identity security for vehicle devices, applications and drivers. Click here to see how we are working to secure the automotive industry.
Blog

By Mike Byrnes

July 19, 2017

IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 
Blog

By Ranjeet Khanna

November 15, 2017

As the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.  
Blog

By Mike Moir

August 21, 2018

Mobile devices have empowered users and become an integral part of our daily lives. And behind the scenes, customization around apps, operating systems and device formats have been created to match every preference — for us — the users. 
Blog

By Entrust Datacard

April 02, 2013

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned).
Blog

By Entrust Datacard

August 14, 2013

Today, mobile technology is a standard method of conducting business. As smart devices become more capable of harboring and transferring information, IT executives are relying on them more and more to contain and transmit sensitive data.
Page 1 of 3