Authentication

Authenticators

Choose the right authenticator for each use case

It’s important to have choices when it comes to authentication methods. A variety of factors will determine which option works best for each use case. Variables include what kind of assets are being accessed, the types of device being used and the types of user groups across your enterprise, including your workforce and external users.

Entrust Datacard Authentication

A wide range of traditional authenticators

Entrust Datacard supports the widest range of authenticators--from hardware tokens to mobile push OTPs--to align with your needs and simplify your transition from basic to high-assurance authentication. This breadth of offering helps you adapt quickly to new technologies and evolving business processes.

Entrust Datacard Authentication

Key considerations when choosing

Do you want authentication to be transparent to the user? Would you like the user to carry a physical device or authenticate online? Do you want the website to authenticate itself to the user as well? How sensitive is the information you are protecting and what is the associated risk? Is physical access (link) to offices, labs or other areas part of your user requirement? Entrust Datacard can help you explore the full range of authenticators and determine the best choice for each of your use cases.

Exploring the Options

  • Transparent authentication
  • Physical Form Factor Authenticators
  • Non-physical Form Factor Authenticators

Transparent Authentication

Transparent authenticators validate users without requiring day-to-day involvement.

Both require banks to become proficient at strong customer authentication (SCA) and make available secure application programming interfaces (APIs) for customer data sharing and consent.

Digital certificates

Our authentication solutions can leverage existing X.509 digital certificates issued from an Entrust Datacard managed digital certificate service or a third-party service to authenticate users. Certificates can be stored locally or on secure devices, such as smart cards and USB tokens.

IP-geolocation

Authenticated users can register locations where they frequently access a corporate network or other key assets. Our solution compares current location data — country, region, city, ISP, latitude and longitude — to registered location data. You can then step up authentication when values don’t match. Other features include the ability to create blacklists of regions, countries or IPs based on fraud histories.

Device Authentication

You can create an encrypted profile after an authenticated user registers a frequently used computer or device. During subsequent authentication, our authentication software creates a new profile and compares it to the stored value. Step-up authentication is required only when the values don’t match.

Start Free Trial

Request a Demo

Request a demo with an IntelliTrust authentication platform specialist.

Our Products

Cloud-Based Deployment

IntelliTrust™

Secure your enterprise and give your users secure access to everything — applications, networks, computers, doors — with cloud-based multi-factor authentication.

On-Premises Deployment

IdentityGuard™

Experienced security professionals in corporations, banks and government agencies know the name IdentityGuard and trust it to protect and enable what matters to them.

SMS Passcode™

SMS Passcode authenticates users by sending a real-time, session-specific one-time passcode (OTP) to the user’s mobile phone via SMS, app, voice-call or email.

Our Authentication
Technologies:

Entrust Datacard Authentication

Establish Trust

Streamline the onboarding of a wide range of users and devices with a wide range of technologies available in our platform.

Entrust Datacard Authentication

Enable Access & Transactions

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Entrust Datacard Authentication

Maintain Trust

Continuously protect against advanced threats with technology ranging from behavior analytics to fraud detection.