Filter Blogs expand_more
Blog add
Authors add
5 Results for 'ePassport'
Blog

By Entrust Datacard

October 15, 2013

Entrust’s technology and expertise has long been used in the most advanced, cryptographically secure travel document deployments across the globe. As the global leader in eID and ePassport technology, Entrust strives to protect enterprises and governments from the constantly evolving threat landscape.
Blog

By Entrust Datacard

November 13, 2015

When it comes to ePassports, that's not a topic that is new to governments. In fact, it has been a subject of discussion - and action - for some time now. Back in 2012, the International Civil Aviation Organization (ICAO) put out a report stating that roughly half of U.N. member states were issuing ePassports. At the time, the U.S. was leading the pack in terms of ePassport offerings, but European countries and nations in the Asia-Pacific region were also gaining momentum as far as their own ePassport presence, according to SecureID News. 
Blog

By Entrust Datacard

August 06, 2013

A balanced relationship must exist between governments that require personal information from citizens entering their country and citizens who are willing to give up this information.
Blog

By Entrust Datacard

March 22, 2016

Authentication, and specifically ePassport technology and biometric scanners, are hugely important to cybersecurity. But it's too early to fully assess whether or not automatic passport kiosks will save a significant amount of time in customs.
Blog

By Entrust Datacard

October 14, 2015

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Page 1 of 1