Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
89 Results for 'identity'
Blog

Building Your Digital DNA: PKI and the Identity Evolution

By Sandra Carielli
September 29, 2016
n its study Why Digital Business Needs a New Approach to Information Security, IDG noted that organizations still focus most often on traditional user-centric use cases like remote access (67 percent of respondents), compliance (67 percent) and privileged access (64 percent); however, they are starting to pay attention to identity issues around mobile devices (50 percent), connected systems (60 percent) and application to application communications (45 percent). What does the shift to “non-human” identities mean for organizations?
Blog

Entrust® IdentityGuard Virtual Appliance - Easy-to-Deploy, Turnkey Authentication Solution

By Entrust Datacard
April 20, 2016
Entrust Datacard introduced the company’s newest authentication solution, Entrust® IdentityGuard Virtual Appliance. The packaged, turnkey, two-factor authentication solution enables organizations to defend against these cyberattacks while empowering and increasing productivity for their IT departments. 
Blog

Facebook vs. Salesforce Battle for Enterprise Identity or Straight Consumerization?

By Entrust Datacard
April 23, 2013
I recently read an interesting article by Ericka Chickowski, “Facebook vs. Salesforce: An Identity Smackdown?” at Dark Reading.
Blog

Top 5 Security Practices for Financial Institutions to Defeat Online Identity Attacks

By Mark Reeves
February 10, 2014
The Bank of England (BoE) recently simulated a major cyber-attack against the British financial system that yielded some disturbing results: many of the UK’s largest financial institutions are unprepared for large-scale online identity-based attacks.
Blog

It All Starts with Identity

By Rajan Barara
July 02, 2018
There are multiple authentication methods that can be used to verify the user’s identity when they are requesting access or verifying a transaction. So how do you define Identity and how does one get one? 
Blog

Leopard Spots and Zebra Stripes: Big Data and Identity Management | Entrust Datacard

By Juan C. Asenjo | Thales eSecurity Global Partner Marketing
June 19, 2018
Big data analytics enables a new behavior-based authentication evolution for easier and more robust identity management. 
Blog

The Federated Identity: Making its Way to the Enterprise Level

By Entrust Datacard
October 03, 2013
Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.
Blog

SSL/TLS Verification – Digital Identity for Your Website

By Diana Gruhn
March 05, 2019
Essentially an SSL/TLS certificate is a form of digital identity for your website. The level of identity differs depending on the type of certificate that you have.
Blog

Cybercrime: Compromising Identity, Reaping Profits, and Not Slowing Down (Part 2)

By Entrust Datacard
April 03, 2014
Part two of a two-part blog feature from Entrust focused on safeguarding personal and enterprise Identity to protect against attack, and how stronger authentication practices can help businesses understand where such attacks are coming from and how to prevent them. For this reason, it is necessary for all organizations to guard identities with strong authentication measures.
Blog

Mobile ID Verification in a Trusted Identity Assurance Platform

By Jacquelyn Painter
October 16, 2018
Did you know that 53% of firms use four or more types of authentication to identify internal users?
Page 1 of 9