SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
+1-888-690-2424
entrust@entrust.com
entrust.com

Entrust Solutions Portfolio

@Entrust

Securing Digital Identities, Transactions and Information

+entrust

As a trusted security expert, Entrust provides comprehensive identity-based
security solutions that safeguard enterprises, governments, financial
institutions, citizens and websites.

/EntrustVideo
/EntrustSecurity

More than 5,000 organizations in 85 countries across the globe leverage
Entrust’s world-class security solutions for strong authentication, physical
and logical access, public key infrastructure (PKI), cloud and mobile
security, citizen eID, employee credentialing, SSL and more.

Proven Solutions

Global Respect

From security-conscious organizations to
innovative government agencies, Entrust helps
secure and protect digital identities, information
and transactions with award-winning solutions.
Trust Entrust to help you defend against
sophisticated online and internal threats,
increase corporate efficiency, and comply
with domestic and international regulations.

Elite organizations and government agencies
— INTERPOL, U.S. Department of State,
NASA, U.K. Ministry of Defence, Bank of New
Zealand, Banco Santander, DnB NOR, Lloyds
TSB, American Airlines, Pfizer, Expedia and
more — look to Entrust to help protect and
secure the most sensitive of assets.

Security begins when organizations know
and trust the identity of those involved in
a given transaction. However, the story of
identity no longer solely focuses on individual
people — increasingly, it’s about devices and
applications — ranging from personal mobile
devices to ATMs and even electric meters.

What We Do
Entrust provides identity-based security
solutions for enterprises, governments,
and financial institutions that:
šš

Protect digital identities through strong
authentication of people, devices and
applications

šš

Leverage mobile devices as smart
credentials, convenient authenticators
or to enable mobile security
applications

šš

Authenticate identities to the cloud and
cloud-based applications

šš

Offer a combination of physical, logical
and mobile authentication solutions via
a single platform

šš

Simplify issuance and management
of smartcards

šš

Provide proven fraud detection
solutions that offer cost-effective
transaction monitoring and risk-based
protection from advanced malware

šš

Enable governments and organizations
to deploy advanced credentialing and
citizen eID projects

uu
entrust.com/success

uu
entrust.com

Trust in Identities

DOWNLOAD
THIS Data Sheet

Security from the Cloud
Entrust IdentityGuard Cloud Services is an
end-to-end digital certificate and identity
management solution that brings together all
certificate services, tools and solutions under
a single cloud-based offering. It’s a simple,
strong and easy solution to issue and manage
identities through their lifecycle via the cloud.
uu
entrust.com/cloud
Entrust Solutions Portfolio
Securing Digital Identities, Transactions and Information

Strong Authentication & Fraud Detection
Entrust’s software authentication platform enables organizations to secure access to sensitive
information and intellectual property for employees, partners and customers. The solution offers
the broadest range of authenticators in the market — all from a single trusted security expert.
Specific to consumer and business-banking environments, the award-winning Entrust IdentityGuard
software authentication platform and the Entrust TransactionGuard fraud detection solution
seamlessly work together to secure and protect digital identities and transactions from online fraud.

STRONG
AUTHENTICATION
& IDENTITY
MANAGEMENT

u Entrust Identityguard
Entrust IdentityGuard enables organizations to layer security — according to access requirements or the risk
of a given transaction — across diverse users, applications, services and cloud-based environments.
To ensure enterprises’ safe migration to cloud services and applications, Entrust offers a single software platform that
provides identity federation, strong authentication, a full range of mobile capabilities and key self-service tools.
Entrust’s diverse set of authentication capabilities include smartcards and USB tokens, soft tokens, grid cards
and eGrids, IP‑geolocation, questions and answers, mobile smart credentials, biometrics, out-of-band one-time
passcode (delivered via voice, SMS or email), out-of-band transaction verification and a range of one-timepasscode tokens.

  Software Authentication Platform

Mobile Soft
Token

Transaction
Verification

Mobile Device
Certificates
Mobile Smart
Credential

SMS
Device
Authentication

Smartcards
and USB

Grid / eGrid
Digital
Certificates

OTP Tokens

IP-Geolocation

Knowledge
Based

Password

Mutual
Authentication

Transaction
Signing

Biometrics

SOFTWARE AUTHENTICATION PLATFORM

Powered by Entrust IdentityGuard. The widest range of authenticators on the market today — all from a single platform.
MOBILE SECURITY
& DEVICE
MANAGEMENT

u Entrust IdentityGuard
Secure mobile identities and transactions, but also leverage mobile devices to improve your organization’s overall
security posture. Authenticate mobile devices connecting to your network, encrypt and digitally sign mobile email
communication, and monitor mobile transactions to detect fraudulent or unauthorized activity.
Entrust also offers a range of on-premise, hosted and pre-integrated mobile device management (MDM) capabilities
to suit your needs. By leveraging mobile devices to secure the online channel, Entrust provides a number of
solutions to defeat malware and secure access to logical, cloud and physical resources.

MOBILE
IDENTITIES

u Entrust Mobile Smart Credentials
Taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust mobile smart credentials
embed digital certificates on smartphones to create trusted identity credentials for stronger, more convenient
enterprise authentication.
Always on hand, these multipurpose credentials securely access computer workstations, network resources, data,
cloud applications, physical doors or buildings, and also enable users to digitally sign transactions and encrypt data.

FRAUD
DETECTION

u Entrust TransactionGuard
Entrust TransactionGuard transparently monitors user behavior to identify anomalies, and then calculates the
risk associated with a particular transaction — all seamlessly and in real-time.
When used with Entrust IdentityGuard, organizations have the ability to increase the strength of authentication
based on the real-time risk of customer behavior, rather than forcing all users to authenticate based on a static policy.

SINGLE
SIGN-ON

u Entrust GetAccess
A scalable, high-performance, SAML-enabled Web access control solution, Entrust GetAccess centrally manages
access to multiple applications through a single portal, providing users with single sign-on to the applications
and content they are authorized to see.

Who We Secure
šš

9 of the top 10 e-governments worldwide

šš

8 of the top 10 global telecom companies

šš

8 of the top 10 global aerospace and defense companies

šš

7 of the top 10 global commercial banks

šš

7 of the top 10 global pharmaceutical companies

šš

4 of the top 5 global petroleum companies
Entrust Solutions Portfolio
Securing Digital Identities, Transactions and Information

Entrust IdentityGuard Cloud Services
Entrust IdentityGuard Cloud Services is an end-to-end digital certificate and identity management
service that brings together all certificate services, tools and solutions under a single cloud-based
service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle
via the cloud.

CERTIFICATE
MANAGEMENT

u Entrust IdentityGuard Cloud Services SSL

CERTIFICATE
DISCOVERY

u Entrust IdentityGuard Cloud Services Discovery

DEVICE
CERTIFICATES

u Entrust IdentityGuard Cloud Services Device Certificates

SMART
CREDENTIALING
SERVICE

u Entrust IdentityGuard Cloud Services Smart Credentials

HOSTED PKI

u Entrust IdentityGuard Cloud Services PKI

Entrust provides a centralized SSL certificate management hub that simplifies the purchase, deployment,
renewal and expiry of digital certificates for multiple Web servers and users. The self-service capabilities
streamline certificate management while providing secure certificates from a trusted brand in online security.

Entrust IdentityGuard Cloud Services Discovery is a comprehensive solution that helps find, inventory and
manage SSL digital certificates across diverse systems and environments. By identifying and evaluating deployed
digital certificates, Discovery helps organizations avoid compliance ramifications, costly outages or even losses
from data breach.

Provision and manage digital certificates to a wide range of devices, including smart meters, ATMs, networked
devices (e.g., printers, servers) and mobile devices. Whether deployed via the cloud, an on-premise model or a
mobile device management (MDM) solution, organizations may select the method that best suits their security
needs, budget and environment.

Entrust IdentityGuard Cloud Services Smart Credentials enable organizations to issue and manage smartcards
and Mobile Smart Credentials (virtual smartcards) for user populations — whether locally or across the globe
— directly from the cloud.

Harness the power of PKI technology without buying, establishing or operating an in-house solution. Establish
and maintain a trustworthy environment by providing certificates that secure many off-the-shelf applications
using encryption, digital signatures and strong certificate authentication.
Control access to resources, prevent theft of information and comply with privacy and digital signature
regulations. With Entrust IdentityGuard Cloud Services PKI, organizations may leverage the certifications obtained,
and trust relationships established, by Entrust — resources not accessible with an in-house PKI.
Public Key Infrastructure & Encryption
A pioneer of public key infrastructure (PKI), Entrust offers customers flexible and manageable
solutions that leverage the unparalleled security capabilities of PKI — delivered as software or as
a cost-effective hosted service.

Authority

Whether it’s ePassports, multipurpose credentials, citizen eID initiatives, secure email, strong
authentication or digital signatures, PKI-based technology represents a collection of the most
valuable solutions Entrust implements for customers across the globe.

ON-PREMISE PKI

u Entrust Authority
Entrust's first public-key infrastructure — the world's first commercially available PKI — was released in 1994.
Now in its eighth edition, the Entrust Authority public key infrastructure product portfolio is the industry’s
most relied upon PKI solution. This platform is also the foundation for Entrust’s many government solutions,
including security for ePassports, first-responder authentication credentials and citizen ID initiatives.

CITIZEN eID &
ePASSPORTS

u Entrust Authority PKI

SECURE EMAIL

u Entrust Entelligence Messaging Server

Entrust provides a variety of proven and trusted options for governments seeking to implement citizen identification
and ePassport programs. From citizen eID cards, ePassports, digital certificates and strong citizen authentication,
Entrust offers expertise, affordability and versatility unmatched by any vendor.

A complete secure communication platform, Entrust Entelligence Messaging Server is a turn-key appliance
for standards-based email encryption. The solution is easy to deploy and maintain for organizations that
communicate sensitive or regulated information — both inside and outside their organization — via email.
The platform supports a range of email encryption standards, including S/MIME, OpenPGP, Adobe PDF and
Web-based email security, as well as secure e-statement delivery.

WEB & DESKTOP
SECURITY

u Entrust Entelligence Security Provider
A more robust alternative to Entrust Entelligence Messaging Server, the Entrust Entelligence Security Provider
not only encrypts email communication, but also offers automatic management of an organization’s digital
IDs. Entrust’s client-side solution provides organizations proven encryption, authentication and digital signature
capabilities to secure Web and desktop applications, as well as enterprise desktops.
Entrust Solutions Portfolio
Securing Digital Identities, Transactions and Information

Certification
Authorities

Entrust Digital Certificate Portfolio
Focused and dedicated, Entrust offers a comprehensive portfolio of SSL and specialty digital
certificates that are proven, cost-effective and supported by standards-based technology.

u Standard & Advantage SSL Certificates

u Entrust Private SSL Certificates

Entrust Standard SSL Certificates provide website identification and
enable 128- and 256-bit encryption between common Web browsers
and Web servers. With more features than the Entrust Standard SSL
Certificate, the Entrust Advantage SSL Certificate offers greater setup
and deployment flexibility.

Deploying Entrust Private SSL Certificates enables the continued use
of non-registered domain names. Domains are registered to just one
customer, further bolstering security. They provide the same key sizes,
signing algorithms, validity periods and CA protection as Entrust’s
proven publicly trusted SSL certificates. And they're issued via a private
shared CA that protects you from possible impersonation attacks by
ensuring no two certificate names are alike.

u EV Multi-Domain SSL Certificates
Entrust EV Multi-Domain SSL Certificates take advantage of the added
visual cues in the latest browsers and give your customers the green light to
perform sensitive online transactions on your trusted site. These certificates
are issued to domains only after rigorous validation of their identity.
u Entrust Wildcard SSL Certificates
Entrust Wildcard SSL Certificates secure an entire domain with one
certificate. By including both www.domain.com and domain.com as
subject alt names (SANs), and allowing the addition of up to nine more
sub-domains as SANs, Entrust Wildcard SSL Certificates are designed
for maximum compatibility. They offer a great combination of flexibility
and value, allowing system administrators to future-proof the addition
of more sub-domains while streamlining management.
u UC Multi-Domain SSL Certificates
Entrust UC Multi-Domain Certificates provide greater flexibility to
support powerful unified communications (UC) products like Microsoft
Exchange Server 2007 and Microsoft Office Communications Server
2007, as well as supporting multiple domains with a single certificate —
without sacrificing security controls.
u Mobile Device Certificates

u Entrust Adobe CDS Certificates
Accessible and affordable, Entrust Adobe CDS Certificates enable
organizations to digitally sign Adobe PDF files. Recipients can feel more
confident by seeing the visual trust indicators that verify who published
the document and whether it has been altered.
u Entrust Code Signing Certificates
To help thwart the trend of malicious malware being disguised as
legitimate software, Entrust Code Signing Certificates allow users to
authenticate the source and verify the content integrity of code that
is downloaded from the Internet.
u Entrust Secure Email Certificates
Publicly trusted Entrust Secure Email Certificates provide a cost-effective
approach for individuals or organizations to encrypt or digitally sign
important communication and information via a managed service.
Based on proven industry standards, Entrust Secure Email Certificates are
available in two distinct levels — personal and enterprise. As their names
suggest, each is designed to provide the appropriate ID validation and
capabilities at price points for the specific environment.

Transparently provision and manage mobile digital certificates on
today’s popular mobile devices to secure identities and transactions,
grant secure access to corporate networks and enable secure email.

A trusted provider of identity-based security solutions, Entrust secures governments,
enterprises and financial institutions in more than 5,000 organizations spanning
85 countries.
Entrust’s award-winning software authentication platforms manage today’s most secure
identity credentials, addressing customer pain points for cloud and mobile security,
physical and logical access, citizen eID initiatives, certificate management and SSL.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.

Company Facts
Website: www.entrust.com
Employees: 359
Customers: 5,000
Offices: 10 globally
Headquarters
Three Lincoln Centre
5430 LBJ Freeway, Suite 1250
Dallas, TX 75240 USA

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust
product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos
are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved.
23732/2-14

Más contenido relacionado

La actualidad más candente

Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachPriyanka Aash
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceVeridium
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
Iot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsIot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsMarket Engel SAS
 
Mcs health passport
Mcs health passportMcs health passport
Mcs health passportChas Yap
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologiesBilcareltd
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoTFIDO Alliance
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyAlasdair Kilgour
 

La actualidad más candente (20)

Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data BreachFool Proof: Protecting Digital Identity in the Age of the Data Breach
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
Iot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsIot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programs
 
Mcs health passport
Mcs health passportMcs health passport
Mcs health passport
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologies
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
Managing Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More EffectivelyManaging Bankruptcy And Restructuring More Effectively
Managing Bankruptcy And Restructuring More Effectively
 

Destacado

Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesEntrust Datacard
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 

Destacado (6)

Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 

Similar a Entrust Solutions Portfolio

Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company BrochureDictao
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : IntroductionSemlex Europe
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Webcraftzs Technologies
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xRyanPaul Mandel
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityVertex Holdings
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014Sectricity
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 

Similar a Entrust Solutions Portfolio (20)

Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Entrust Solutions Portfolio

  • 1. +1-888-690-2424 entrust@entrust.com entrust.com Entrust Solutions Portfolio @Entrust Securing Digital Identities, Transactions and Information +entrust As a trusted security expert, Entrust provides comprehensive identity-based security solutions that safeguard enterprises, governments, financial institutions, citizens and websites. /EntrustVideo /EntrustSecurity More than 5,000 organizations in 85 countries across the globe leverage Entrust’s world-class security solutions for strong authentication, physical and logical access, public key infrastructure (PKI), cloud and mobile security, citizen eID, employee credentialing, SSL and more. Proven Solutions Global Respect From security-conscious organizations to innovative government agencies, Entrust helps secure and protect digital identities, information and transactions with award-winning solutions. Trust Entrust to help you defend against sophisticated online and internal threats, increase corporate efficiency, and comply with domestic and international regulations. Elite organizations and government agencies — INTERPOL, U.S. Department of State, NASA, U.K. Ministry of Defence, Bank of New Zealand, Banco Santander, DnB NOR, Lloyds TSB, American Airlines, Pfizer, Expedia and more — look to Entrust to help protect and secure the most sensitive of assets. Security begins when organizations know and trust the identity of those involved in a given transaction. However, the story of identity no longer solely focuses on individual people — increasingly, it’s about devices and applications — ranging from personal mobile devices to ATMs and even electric meters. What We Do Entrust provides identity-based security solutions for enterprises, governments, and financial institutions that: šš Protect digital identities through strong authentication of people, devices and applications šš Leverage mobile devices as smart credentials, convenient authenticators or to enable mobile security applications šš Authenticate identities to the cloud and cloud-based applications šš Offer a combination of physical, logical and mobile authentication solutions via a single platform šš Simplify issuance and management of smartcards šš Provide proven fraud detection solutions that offer cost-effective transaction monitoring and risk-based protection from advanced malware šš Enable governments and organizations to deploy advanced credentialing and citizen eID projects uu entrust.com/success uu entrust.com Trust in Identities DOWNLOAD THIS Data Sheet Security from the Cloud Entrust IdentityGuard Cloud Services is an end-to-end digital certificate and identity management solution that brings together all certificate services, tools and solutions under a single cloud-based offering. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud. uu entrust.com/cloud
  • 2. Entrust Solutions Portfolio Securing Digital Identities, Transactions and Information Strong Authentication & Fraud Detection Entrust’s software authentication platform enables organizations to secure access to sensitive information and intellectual property for employees, partners and customers. The solution offers the broadest range of authenticators in the market — all from a single trusted security expert. Specific to consumer and business-banking environments, the award-winning Entrust IdentityGuard software authentication platform and the Entrust TransactionGuard fraud detection solution seamlessly work together to secure and protect digital identities and transactions from online fraud. STRONG AUTHENTICATION & IDENTITY MANAGEMENT u Entrust Identityguard Entrust IdentityGuard enables organizations to layer security — according to access requirements or the risk of a given transaction — across diverse users, applications, services and cloud-based environments. To ensure enterprises’ safe migration to cloud services and applications, Entrust offers a single software platform that provides identity federation, strong authentication, a full range of mobile capabilities and key self-service tools. Entrust’s diverse set of authentication capabilities include smartcards and USB tokens, soft tokens, grid cards and eGrids, IP‑geolocation, questions and answers, mobile smart credentials, biometrics, out-of-band one-time passcode (delivered via voice, SMS or email), out-of-band transaction verification and a range of one-timepasscode tokens.   Software Authentication Platform Mobile Soft Token Transaction Verification Mobile Device Certificates Mobile Smart Credential SMS Device Authentication Smartcards and USB Grid / eGrid Digital Certificates OTP Tokens IP-Geolocation Knowledge Based Password Mutual Authentication Transaction Signing Biometrics SOFTWARE AUTHENTICATION PLATFORM Powered by Entrust IdentityGuard. The widest range of authenticators on the market today — all from a single platform.
  • 3. MOBILE SECURITY & DEVICE MANAGEMENT u Entrust IdentityGuard Secure mobile identities and transactions, but also leverage mobile devices to improve your organization’s overall security posture. Authenticate mobile devices connecting to your network, encrypt and digitally sign mobile email communication, and monitor mobile transactions to detect fraudulent or unauthorized activity. Entrust also offers a range of on-premise, hosted and pre-integrated mobile device management (MDM) capabilities to suit your needs. By leveraging mobile devices to secure the online channel, Entrust provides a number of solutions to defeat malware and secure access to logical, cloud and physical resources. MOBILE IDENTITIES u Entrust Mobile Smart Credentials Taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust mobile smart credentials embed digital certificates on smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication. Always on hand, these multipurpose credentials securely access computer workstations, network resources, data, cloud applications, physical doors or buildings, and also enable users to digitally sign transactions and encrypt data. FRAUD DETECTION u Entrust TransactionGuard Entrust TransactionGuard transparently monitors user behavior to identify anomalies, and then calculates the risk associated with a particular transaction — all seamlessly and in real-time. When used with Entrust IdentityGuard, organizations have the ability to increase the strength of authentication based on the real-time risk of customer behavior, rather than forcing all users to authenticate based on a static policy. SINGLE SIGN-ON u Entrust GetAccess A scalable, high-performance, SAML-enabled Web access control solution, Entrust GetAccess centrally manages access to multiple applications through a single portal, providing users with single sign-on to the applications and content they are authorized to see. Who We Secure šš 9 of the top 10 e-governments worldwide šš 8 of the top 10 global telecom companies šš 8 of the top 10 global aerospace and defense companies šš 7 of the top 10 global commercial banks šš 7 of the top 10 global pharmaceutical companies šš 4 of the top 5 global petroleum companies
  • 4. Entrust Solutions Portfolio Securing Digital Identities, Transactions and Information Entrust IdentityGuard Cloud Services Entrust IdentityGuard Cloud Services is an end-to-end digital certificate and identity management service that brings together all certificate services, tools and solutions under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud. CERTIFICATE MANAGEMENT u Entrust IdentityGuard Cloud Services SSL CERTIFICATE DISCOVERY u Entrust IdentityGuard Cloud Services Discovery DEVICE CERTIFICATES u Entrust IdentityGuard Cloud Services Device Certificates SMART CREDENTIALING SERVICE u Entrust IdentityGuard Cloud Services Smart Credentials HOSTED PKI u Entrust IdentityGuard Cloud Services PKI Entrust provides a centralized SSL certificate management hub that simplifies the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers and users. The self-service capabilities streamline certificate management while providing secure certificates from a trusted brand in online security. Entrust IdentityGuard Cloud Services Discovery is a comprehensive solution that helps find, inventory and manage SSL digital certificates across diverse systems and environments. By identifying and evaluating deployed digital certificates, Discovery helps organizations avoid compliance ramifications, costly outages or even losses from data breach. Provision and manage digital certificates to a wide range of devices, including smart meters, ATMs, networked devices (e.g., printers, servers) and mobile devices. Whether deployed via the cloud, an on-premise model or a mobile device management (MDM) solution, organizations may select the method that best suits their security needs, budget and environment. Entrust IdentityGuard Cloud Services Smart Credentials enable organizations to issue and manage smartcards and Mobile Smart Credentials (virtual smartcards) for user populations — whether locally or across the globe — directly from the cloud. Harness the power of PKI technology without buying, establishing or operating an in-house solution. Establish and maintain a trustworthy environment by providing certificates that secure many off-the-shelf applications using encryption, digital signatures and strong certificate authentication. Control access to resources, prevent theft of information and comply with privacy and digital signature regulations. With Entrust IdentityGuard Cloud Services PKI, organizations may leverage the certifications obtained, and trust relationships established, by Entrust — resources not accessible with an in-house PKI.
  • 5. Public Key Infrastructure & Encryption A pioneer of public key infrastructure (PKI), Entrust offers customers flexible and manageable solutions that leverage the unparalleled security capabilities of PKI — delivered as software or as a cost-effective hosted service. Authority Whether it’s ePassports, multipurpose credentials, citizen eID initiatives, secure email, strong authentication or digital signatures, PKI-based technology represents a collection of the most valuable solutions Entrust implements for customers across the globe. ON-PREMISE PKI u Entrust Authority Entrust's first public-key infrastructure — the world's first commercially available PKI — was released in 1994. Now in its eighth edition, the Entrust Authority public key infrastructure product portfolio is the industry’s most relied upon PKI solution. This platform is also the foundation for Entrust’s many government solutions, including security for ePassports, first-responder authentication credentials and citizen ID initiatives. CITIZEN eID & ePASSPORTS u Entrust Authority PKI SECURE EMAIL u Entrust Entelligence Messaging Server Entrust provides a variety of proven and trusted options for governments seeking to implement citizen identification and ePassport programs. From citizen eID cards, ePassports, digital certificates and strong citizen authentication, Entrust offers expertise, affordability and versatility unmatched by any vendor. A complete secure communication platform, Entrust Entelligence Messaging Server is a turn-key appliance for standards-based email encryption. The solution is easy to deploy and maintain for organizations that communicate sensitive or regulated information — both inside and outside their organization — via email. The platform supports a range of email encryption standards, including S/MIME, OpenPGP, Adobe PDF and Web-based email security, as well as secure e-statement delivery. WEB & DESKTOP SECURITY u Entrust Entelligence Security Provider A more robust alternative to Entrust Entelligence Messaging Server, the Entrust Entelligence Security Provider not only encrypts email communication, but also offers automatic management of an organization’s digital IDs. Entrust’s client-side solution provides organizations proven encryption, authentication and digital signature capabilities to secure Web and desktop applications, as well as enterprise desktops.
  • 6. Entrust Solutions Portfolio Securing Digital Identities, Transactions and Information Certification Authorities Entrust Digital Certificate Portfolio Focused and dedicated, Entrust offers a comprehensive portfolio of SSL and specialty digital certificates that are proven, cost-effective and supported by standards-based technology. u Standard & Advantage SSL Certificates u Entrust Private SSL Certificates Entrust Standard SSL Certificates provide website identification and enable 128- and 256-bit encryption between common Web browsers and Web servers. With more features than the Entrust Standard SSL Certificate, the Entrust Advantage SSL Certificate offers greater setup and deployment flexibility. Deploying Entrust Private SSL Certificates enables the continued use of non-registered domain names. Domains are registered to just one customer, further bolstering security. They provide the same key sizes, signing algorithms, validity periods and CA protection as Entrust’s proven publicly trusted SSL certificates. And they're issued via a private shared CA that protects you from possible impersonation attacks by ensuring no two certificate names are alike. u EV Multi-Domain SSL Certificates Entrust EV Multi-Domain SSL Certificates take advantage of the added visual cues in the latest browsers and give your customers the green light to perform sensitive online transactions on your trusted site. These certificates are issued to domains only after rigorous validation of their identity. u Entrust Wildcard SSL Certificates Entrust Wildcard SSL Certificates secure an entire domain with one certificate. By including both www.domain.com and domain.com as subject alt names (SANs), and allowing the addition of up to nine more sub-domains as SANs, Entrust Wildcard SSL Certificates are designed for maximum compatibility. They offer a great combination of flexibility and value, allowing system administrators to future-proof the addition of more sub-domains while streamlining management. u UC Multi-Domain SSL Certificates Entrust UC Multi-Domain Certificates provide greater flexibility to support powerful unified communications (UC) products like Microsoft Exchange Server 2007 and Microsoft Office Communications Server 2007, as well as supporting multiple domains with a single certificate — without sacrificing security controls. u Mobile Device Certificates u Entrust Adobe CDS Certificates Accessible and affordable, Entrust Adobe CDS Certificates enable organizations to digitally sign Adobe PDF files. Recipients can feel more confident by seeing the visual trust indicators that verify who published the document and whether it has been altered. u Entrust Code Signing Certificates To help thwart the trend of malicious malware being disguised as legitimate software, Entrust Code Signing Certificates allow users to authenticate the source and verify the content integrity of code that is downloaded from the Internet. u Entrust Secure Email Certificates Publicly trusted Entrust Secure Email Certificates provide a cost-effective approach for individuals or organizations to encrypt or digitally sign important communication and information via a managed service. Based on proven industry standards, Entrust Secure Email Certificates are available in two distinct levels — personal and enterprise. As their names suggest, each is designed to provide the appropriate ID validation and capabilities at price points for the specific environment. Transparently provision and manage mobile digital certificates on today’s popular mobile devices to secure identities and transactions, grant secure access to corporate networks and enable secure email. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Company Facts Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved. 23732/2-14