Two Factor Authentication

Entrust Datacard offers mobile-enabled, two-factor authentication solutions that provide your users with one trusted identity for all of their authentication needs.

Our solutions combine strong authentication with bold enablement. We utilize the convenience and ubiquity of mobile technology to allow you to authenticate trusted identities without compromising usability. Our two-pronged approach involves first securing a user’s mobile device, then leveraging it to improve security – an effective method to reduce business risk and improve the user experience.


Legacy Two-Factor Authentication

Mobile and cloud have transformed the way we do business. Security parameters are changing, applications are multiplying, and user expectations are increasing. As digital business evolves, legacy two-factor authentication – such as passwords, grid cards and hardware tokens – no longer provides adequate protection against unauthorized access. Today, a foundational element of your success relies on trusted identity.

Legacy Two-Factor Authentication
Two-Factor Authentication 2FA


Modern, Intelligent, Two-Factor Authentication (2FA)

Two-factor authentication (2FA) is a security method used to verify a user’s identity in order to provide secure access to networks, applications, cloud services and physical buildings. It provides stronger access security because it requires two methods (or factors) to confirm a user’s identity. Our modern approach focuses on secure mobile identities and behavioral biometric solutions to provide high identity assurance without compromising usability.

Adaptive Authentication – A Secure, Risk-Based Approach

Our solutions employ adaptive authentication methods to provide a secure, transparent user experience by enabling step-up authentication when a user has been identified and elevated as a potential risk. Our approach utilizes device reputation, transaction analytics and behavioral biometrics to anticipate and adapt to threats in real time, providing strong security without creating friction for your users.

Adaptive Authentication

Device Reputation

Device reputation recognizes and detects fraudulent behavior across all types of Internet devices – including desktop, mobile and tablets – and then employs additional step-up security measures when necessary. It can even detect risks prior to login, and it integrates with both websites and applications.

Device Reputation

Forrester Report: Modern Authentication Methods
Protect and Enable the Business

Forrester unveils insights from 100 IT and IT security executives regarding their approaches to and challenges with user authentication and access management.


Entrust IndentityGuard Adaptive Authentication Brochure

Transparent Authentication for Online and Mobile Channels

Helping you Build a Secure, Innovative IT Strategy for Your Business

Our portfolio includes on-premises, virtual appliance and cloud-based authentication solutions, providing you with one trusted solution partner for all of your authentication and identity-assurance needs. Our commitment to continuous innovation means we will work with you to guide you and help you create a highly secure, yet user-friendly digital enterprise.

Our Two-Factor Authentication Solutions Offer:

☑ Modern, mobile authentication capabilities to protect your business
☑ Transparent authentication for a better user experience
☑ Support for multiple use cases
☑ Digital certificates for stronger assurance
☑ An extensive list of integrations that provide secure connectivity

Measurable Benefits

Move Beyond the Pain and Risk of Passwords

Passwords can no longer be trusted to protect your business. Not only are they easy to compromise, but the manner in which people manage them makes them more vulnerable. Our solutions allow you to move beyond passwords to a more secure approach that fits with the way people prefer to work.

Invest Wisely, Invest Once

Our authentication platform provides a single management solution for issuing, provisioning, managing and authenticating the digital identities of users and devices — across a broad range of use cases. While you may only have one need today, our solution can grow with you as those needs change.

Streamlined Access for Authorized Users

Mobile-enabled authentication allows users to access networks and buildings, collaborate with peers and communicate securely — using the devices they carry today. Our solution offers strong security and ensures high accessibility for authorized users.

Reduce IT Costs and Complexity

Leveraging mobile eliminates the need to purchase dedicated and often costly hardware tokens, and it simplifies user provisioning and management as users already know how to download and update mobile applications. The broad range of Entrust Datacard self-service features makes enrollment and activation easy.

Technical Support

Support Your System

Get downloads, documentation and support for your On-Demand Card Issuance products:

Need More Help?

For immediate assistance Entrust Datacard has Customer Care Centers that are available to serve customers in the Americas, EMEA, and Asia Pacific regions.



Strong Authentication (7)

Intellitrust™ Authentication Service

The cloud authentication service built for the demands of your enterprise
  • Authenticators built for the enterprise
  • Infrastructure integrations
  • Single sign-on/federation
  • Adaptive authentication

IdentityGuard Two Factor Authentication

Entrust IdentityGuard™ two-factor authentication solution (2FA) ensures strong security for online and mobile transactions and protected access to website, building and more.

IdentityGuard Adaptive Authentication

Our risk-based adaptive authentication solution handles an array of inputs for strong decisions, including device fingerprint, device reputation and area behavior.

IdentityGuard Mobile

Entrust IdentityGuard™ mobile allows you to secure and enable your enterprise with a choice of one-time passcode and certificate-based applications.

IdentityGuard Virtual Appliance

With Entrust® IdentityGuard™ Virtual Appliance,a prepackaged application and operating system come fully configured and ready to run in a virtual environment.

TransactionGuard Fraud Detection Software

Entrust TransactionGuard works seamlessly with Entrust IdentityGuard to create layered security for diverse users and applications. Detect online fraud without invasive integration with existing online applications and step-up authentication controls only when dictated by elevated risk.

GetAccess Single Sign-On

Give your employees, customers and partners a single sign-on solution for accessing digital content, data and a variety of online services.

Trusted PKI Solutions (2)

Public Key Infrastructure (PKI) Based Authentication

Apply encryption, digital signature and certificate authentication consistently across a range of applications and platforms with Entrust Authority PKI.

Managed PKI Service

Entrust managed PKI features highly available, fully redundant infrastructure with intelligent monitoring, robust data backup and exceptional disaster recovery.