Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
9 Results for 'networks'
Blog

By Sandra Carielli

March 13, 2017

For more on the ubiquity of trust in the digital business economy (and to hear me question some of the trust assumptions I made during my skydiving adventure), check out my conversation with IDG about Trusted Identity. How are you building trust across your infrastructure (people, process and technology) to accelerate your digital business initiatives?
Blog

By Ranjeet Khanna

November 15, 2017

As the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.  
Blog

By Entrust Datacard

April 02, 2013

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned).
Blog

By Entrust Datacard

October 02, 2013

Recently, a form of identity theft known as spear phishing has been making headlines. While the method isn’t new, thieves are using it more and more to break into networks and steal data.
Blog

By Entrust Datacard

April 16, 2014

The cybersphere is not kind to companies that don't take measures to protect themselves -- and their customers -- from attack. A recently released infographic from Imprima does not paint a pretty picture of the state of enterprise security. Businesses have the power to prevent themselves from getting breached. One of the answers lies in identity-guarding options like two-factor authentication, which functions to ensures only authorizes users are accessing company networks, applications, servers and more. Entrust experts say there is no telling when a malicious force will try to breach a company. But when it happens, the smart play is to be prepared.
Blog

By Entrust Datacard

June 15, 2015

Back in 1994, Entrust debuted the world's first commercially available public key infrastructure. In the more than 20 years since then, it's been refining and building on the technology. Over the past two decades, enterprise security needs have skyrocketed alongside the growth of connected technology. According to one report from last year, 94 percent of the organizations surveyed reported experiencing cybersecurity issues. These days, a single targeted attack can end up costing an enterprise millions of dollars - and it's not only big corporations and financial institutions that are targeted: From medicine and government entities to small and medium-sized companies, everyone is a target. Across the board, susceptibility to cybercrime has never been higher.
Blog

By Entrust Datacard

September 29, 2015

In a business environment, the odds of someone encountering malware are extremely high. As one report revealed, 45 percent of Internet users came up against malware during last year alone. And these days, confronting a malicious strain can often be accompanied by significant repercussions. Among the most common consequences that occur as a result of a malicious infection are changes in operating system settings, unauthorized social media posting, data loss and information theft. For one out of three users who is infected with malware, that intrusion will lead to monetary losses. Considering that almost half of Web users faced malware, it should come as little surprise that enterprises - which have networks accessed by many different people - are particularly vulnerable to intrusions.
Blog

By Mike Moir

December 19, 2018

This gift that just keeps giving will be available direct from Citrix and Entrust Datacard or through your favorite local systems integrator beginning in January.
Blog

By Entrust Datacard

April 14, 2014

To ensure the maintenance of enterprise security in the age of BYOD, Entrust recommends companies implement a certificate authentication structure for their mobile networks to create a unique identity for each smartphone or tablet connected to the company. By generating identities for each device, company IT departments can help guarantee that these products are suitably guarded and, therefore, trustworthy.
Page 1 of 1