SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
DOWNLOAD
THIS Data Sheet
@Entrust
+entrust
/EntrustVideo
/EntrustSecurity
+1-888-690-2424
entrust@entrust.com
entrust.com/mobile-credentials
šš Key component of the Entrust
IdentityGuard Cloud Services solution
šš Transform mobile devices into virtual
credentials for secure access to networks,
applications and physical resources
šš Leverage mobile for out-of-band
transaction confirmation to defeat
desktop-based malware
šš Streamline business services with
anywhere, anytime mobile digital
signatures
šš Extend strong identities for secure
cloud access, encryption and digital
signatures
šš Reduce total cost of ownership by
removing need for expensive physical
form factors, printers and specialty
desktop readers
šš Future-proof authentication investments
with platform approach that easily
integrates with new security technology
šš Developed for the real world with
out-of-the-box support for iOS, Android,
BlackBerry and Windows Phone mobile
operating systems
Service Benefits
Mobile Device to
Digital Identity
These multipurpose credentials securely
access computer workstations, network
resources, data, cloud applications, physical
doors or buildings, and also enable users to
digitally sign transactions and encrypt data.
It’s more convenient, easier to use, cost-
effective to deploy and provides support for
a number of authentication and information-
protection needs within the enterprise and
across customer bases.
uu entrust.com/mobile
Simple User Experience
Deploying strong authentication credentials
on employee and customer mobile
devices not only meets security needs,
but dramatically simplifies the end-user
experience with ease and convenience.
Identity credentials will always be on hand
— no more single-purpose smartcards, OTP
tokens, complex passwords or costly resets.
Efficiency from the Cloud
The management infrastructure behind
Entrust’s Mobile Smart Credentials, Entrust
IdentityGuard Cloud Services improves
efficiency and accelerates ROI by providing
a single, secure and scalable consolidated
digital identity and simplified certificate
management platform. Ease the burden
of managing security and allow staff and
resources to focus on their core business
and responsibilities.
uu entrust.com/CloudPKI
Multipurpose Credentials
Gain the power and convenience of mobile
devices as easy-to-use authenticators for both
internal employees accessing physical and
logical resources, and customers accessing
mobile and online services. Rich policy and
workflow engines simplify credential issuance
and temporary replacement or recovery,
requiring fewer demands on IT help desks.
Entrust IdentityGuard Cloud
Services Mobile Smart Credential
Transform Mobile Devices into
Multipurpose Digital Identities
Even the best IT organizations experience difficulty managing the sheer
volume of identities within their organization. It’s no longer sufficient to
manage just desktops, as the infrastructure has moved well beyond static
environments. Mobile devices are now the platform of choice.
The Entrust IdentityGuard Cloud Services Mobile Smart Credential is an
innovative mobile application that transforms popular mobile devices
into virtual smartcards, eliminating the need for plastic smartcards,
one-time-passcode hardware tokens and even passwords.
Entrust IdentityGuard Cloud Services Mobile Smart Credential
Transform Mobile Devices into Multipurpose Digital Identities
Flexible Integration
Developed for use in the real world, the Mobile Smart Credential
supports today’s most popular mobile platforms, including Apple iOS,
Google Android and BlackBerry.
The solution offers built-in integration for simple deployment,
regardless of the mobile operating systems used within your
environment. This flexibility enables IT organizations to work with
end-users and provides a means of a true bring-your-own-device
(BYOD) service while still enabling controlled service.
Diverse Enterprise Use Cases
šš Secure logical access, including Microsoft® Windows® Smartcard
Logon, VPN and cloud-based applications
šš Secure physical access to facilities
šš Digital-signing of desktop forms, documents and emails
šš Encryption of desktop email and information
Reduce Cost & Complexity
With ongoing pressure to reduce IT capital expenditure and operating expense, the Mobile
Smart Credential solution helps eliminate the need for physical smartcards, card-printing and
personalization systems, as well as the complex IT processes to enroll and provision user accounts.
The solution leverages the power of mobile computing and over-the-air (OTA) provisioning,
as well as rich policy and workflow capabilities, to eliminate manual processes and empower
end-users to easily enroll and recover credentials as required.
Logical
Access
Physical
Access
Digital
Signatures
Mobile Digital
Signatures
Encryption Cloud VPN Malware
Prevention
• User Self-Provisioning
• User Self-Recovery
• Fallback Authenticator Support
The always-on-hand credential. Leverage mobile devices to reduce overall cost, defeat malware, implement mobile-based digital signatures and simplify secure physical, logical and cloud access.
  Entrust IdentityGuard Cloud Services Mobile Smart Credential
Challenge Result Close
ATT 100%10:21 AM
AnyBank
User jsmith wants to authenticate to
confirm their AnyBank Wire Transfer
Result: Identity Assured
Type: Transaction
Date: 2014-03-19 10:21 AM
Amount 11,986.27
To Account AnyCorp (321432-1464)
From Account Savings (35644-57459)
Challenge Summary
Transaction Details
Identities SettingChallengesSmart Card About
✓
Banking verified. Mobile out-of-band transaction verification enables users
to raise concern about potential fraud or confirm the legitimacy of transactions.
Secure Customer & Enterprise Accounts
From securing corporate bank accounts to verifying business
transactions, leverage mobile devices to review and approve critical
transactions on a separate, secure channel.
Defeat Malware & APTs
Identity-assured transactions are a proven defense against malware,
advanced persistent threats (APT) and other online fraud. Move
transactions out-of-band to the mobile channel to review exact
transaction details, and also provide real-time confirmation and
approval from the convenience of a smartphone.
Authenticate Web & Cloud Transactions
The Mobile Smart Credential is an effective and elegant method to
strongly secure digital identities, but also is used to safely authenticate
Web or cloud transactions to defeat advanced malware and other
nefarious attacks.
Mobile Digital Signatures Streamline Business
Internal business processes and customer-facing services often require
legally binding digital signatures that are fundamental for day-to-day
operations. But traditional methods are cumbersome, slow and fail to
drive business.
The Mobile Smart Credential helps organizations streamline business with
strong, non-repudiated digital signatures — right from a mobile device.
Create Legally Binding Digital Signatures
Any document or transaction that requires formal approval may be
executed right from today’s most popular smartphones. The end-user’s
secure, authenticated digital identity is used to create a digital signature
that is both legally binding and provides trusted non-repudiated.
Multiple Identities, One Device
In certain situations, users may require support for multiple identities. With the Mobile Smart
Credential, multiple identities may be stored in one smart credential identity container,
eliminating the need for multiple smartcards and access credentials.
Entrust IdentityGuard Cloud Services Mobile Smart Credential
Transform Mobile Devices into Multipurpose Digital Identities
Solution Advantages
Entrust provides organizations a comprehensive solution that consolidates certificate and
identity management, as well as all respective authentication requirements, within a single
platform. By leveraging Mobile Smart Credentials, organizations are able to reduce cost and
complexity, future-proof investment and integrate advanced technology for greater security.
Future-Proof Solution
Maximize your authentication investment
by ensuring it’s flexible enough to leverage
future security technology to help adapt
to the next evolution of attacks. The
framework extends identities to physical
access, cloud-based applications and
new authentication approaches as the
technology, threat landscape and business
needs evolve.
Reduce TCO, Simplify
Credential Provisioning
By eliminating the need to issue and
deliver physical authenticators and
desktop smartcard readers, provisioning
efforts, cost and daily management are
greatly reduced. The solution provides
simple over-the-air provisioning (OTA)
and helps streamline user enrollment
and self-recovery.
Authentication Policies
Entrust’s framework provides support for
varied authentication policies across different
user communities (e.g., internal departments,
customers or partners) and gives the ability
to change a user’s authenticator with
minimal cost or effort should business needs
or security threats dictate. The approach
empowers organizations to dynamically
evolve to address advanced identity threats
in real time.
Business Made Efficient
Deploying identities on mobile
devices provides a number of
business opportunities to eliminate
cumbersome and costly paper-based
processes for formal approvals. Mobile
digital signatures speed the pace
of business and deliver convenient
methods for employees and customers
to provide approval or verification
of transactions, communication and
other sensitive information.
Automatic Credential Detection
Remove the human element by leveraging
Entrust’s automatic workstation logout
features, which engage when an end-user
leaves the premise, desk or work area.
With Bluetooth and NFC integration, the
solution automatically detects mobile
devices with embedded credentials. The
solution asks the user to enter their PIN when
they approach their workstation, removing
the outdated need to enter usernames and
passwords.
Defeat Advanced Malware
The Entrust IdentityGuard Mobile
Smart Credential provides the best
line of defense against malware-based
attacks (e.g., man-in-the-browser)
and opens the door for streamlining
business processes with anywhere,
anytime mobile digital signatures.
Mobile devices provide a separate
channel from user desktops and may be
leveraged for out-of-band transaction
verification to defeat malware-based
threats such as man-in-the-browser
and other malicious attacks (e.g., Trojan
variations).
A trusted provider of identity-based security solutions, Entrust secures governments,
enterprises and financial institutions in more than 5,000 organizations spanning
85 countries.
Entrust’s award-winning software authentication platforms manage today’s most secure
identity credentials, addressing customer pain points for cloud and mobile security,
physical and logical access, citizen eID initiatives, certificate management and SSL.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust
product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos
are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved.
Company Facts
Website: www.entrust.com
Employees: 359
Customers: 5,000
Offices: 10 globally
Headquarters
Three Lincoln Centre
5430 LBJ Freeway, Suite 1250
Dallas, TX 75240 USA
24566/2-14
Entrust IdentityGuard Cloud Services Mobile Smart Credential
Transform Mobile Devices into Multipurpose Digital Identities
Entrust IdentityGuard Cloud Services
Entrust IdentityGuard Cloud Services is a comprehensive cloud-based
solution that offers Entrust’s complete line of identity-based security
solutions. Manage all identities and certificates — related to SSL, smart
credentials, device certificates, PKI and certificate discovery — right
from a single cloud interface.
This approach provides a simple, strong and easy solution to issue and
manage identities through their lifecycle via the cloud.
Entrust IdentityGuard Cloud Services
šš SSL
šš Smart Credentials
šš Device Certificates
šš PKI
šš Discovery
NFC & Bluetooth Integration
Taking advantage of near-field
communication (NFC) and Bluetooth
standards, Entrust embeds biometrics and
digital certificates on smartphones to create
trusted identity credentials for stronger,
more convenient enterprise authentication.
Authenticated desktop logins are as simple
as having a mobile device in proximity to
a workstation.
Proximity-Based Logout
Entrust offers proximity-based
automatic logout that helps increase
security — a critical capability for
organizations that require shared
workstations (e.g., doctors, stock
traders).
Solution Advantages

Contenu connexe

Plus de Entrust Datacard

INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Plus de Entrust Datacard (7)

INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Dernier

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 

Dernier (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 

Entrust IdentityGuard Cloud Services Mobile Smart Credential

  • 1. DOWNLOAD THIS Data Sheet @Entrust +entrust /EntrustVideo /EntrustSecurity +1-888-690-2424 entrust@entrust.com entrust.com/mobile-credentials šš Key component of the Entrust IdentityGuard Cloud Services solution šš Transform mobile devices into virtual credentials for secure access to networks, applications and physical resources šš Leverage mobile for out-of-band transaction confirmation to defeat desktop-based malware šš Streamline business services with anywhere, anytime mobile digital signatures šš Extend strong identities for secure cloud access, encryption and digital signatures šš Reduce total cost of ownership by removing need for expensive physical form factors, printers and specialty desktop readers šš Future-proof authentication investments with platform approach that easily integrates with new security technology šš Developed for the real world with out-of-the-box support for iOS, Android, BlackBerry and Windows Phone mobile operating systems Service Benefits Mobile Device to Digital Identity These multipurpose credentials securely access computer workstations, network resources, data, cloud applications, physical doors or buildings, and also enable users to digitally sign transactions and encrypt data. It’s more convenient, easier to use, cost- effective to deploy and provides support for a number of authentication and information- protection needs within the enterprise and across customer bases. uu entrust.com/mobile Simple User Experience Deploying strong authentication credentials on employee and customer mobile devices not only meets security needs, but dramatically simplifies the end-user experience with ease and convenience. Identity credentials will always be on hand — no more single-purpose smartcards, OTP tokens, complex passwords or costly resets. Efficiency from the Cloud The management infrastructure behind Entrust’s Mobile Smart Credentials, Entrust IdentityGuard Cloud Services improves efficiency and accelerates ROI by providing a single, secure and scalable consolidated digital identity and simplified certificate management platform. Ease the burden of managing security and allow staff and resources to focus on their core business and responsibilities. uu entrust.com/CloudPKI Multipurpose Credentials Gain the power and convenience of mobile devices as easy-to-use authenticators for both internal employees accessing physical and logical resources, and customers accessing mobile and online services. Rich policy and workflow engines simplify credential issuance and temporary replacement or recovery, requiring fewer demands on IT help desks. Entrust IdentityGuard Cloud Services Mobile Smart Credential Transform Mobile Devices into Multipurpose Digital Identities Even the best IT organizations experience difficulty managing the sheer volume of identities within their organization. It’s no longer sufficient to manage just desktops, as the infrastructure has moved well beyond static environments. Mobile devices are now the platform of choice. The Entrust IdentityGuard Cloud Services Mobile Smart Credential is an innovative mobile application that transforms popular mobile devices into virtual smartcards, eliminating the need for plastic smartcards, one-time-passcode hardware tokens and even passwords.
  • 2. Entrust IdentityGuard Cloud Services Mobile Smart Credential Transform Mobile Devices into Multipurpose Digital Identities Flexible Integration Developed for use in the real world, the Mobile Smart Credential supports today’s most popular mobile platforms, including Apple iOS, Google Android and BlackBerry. The solution offers built-in integration for simple deployment, regardless of the mobile operating systems used within your environment. This flexibility enables IT organizations to work with end-users and provides a means of a true bring-your-own-device (BYOD) service while still enabling controlled service. Diverse Enterprise Use Cases šš Secure logical access, including Microsoft® Windows® Smartcard Logon, VPN and cloud-based applications šš Secure physical access to facilities šš Digital-signing of desktop forms, documents and emails šš Encryption of desktop email and information Reduce Cost & Complexity With ongoing pressure to reduce IT capital expenditure and operating expense, the Mobile Smart Credential solution helps eliminate the need for physical smartcards, card-printing and personalization systems, as well as the complex IT processes to enroll and provision user accounts. The solution leverages the power of mobile computing and over-the-air (OTA) provisioning, as well as rich policy and workflow capabilities, to eliminate manual processes and empower end-users to easily enroll and recover credentials as required. Logical Access Physical Access Digital Signatures Mobile Digital Signatures Encryption Cloud VPN Malware Prevention • User Self-Provisioning • User Self-Recovery • Fallback Authenticator Support The always-on-hand credential. Leverage mobile devices to reduce overall cost, defeat malware, implement mobile-based digital signatures and simplify secure physical, logical and cloud access.   Entrust IdentityGuard Cloud Services Mobile Smart Credential
  • 3. Challenge Result Close ATT 100%10:21 AM AnyBank User jsmith wants to authenticate to confirm their AnyBank Wire Transfer Result: Identity Assured Type: Transaction Date: 2014-03-19 10:21 AM Amount 11,986.27 To Account AnyCorp (321432-1464) From Account Savings (35644-57459) Challenge Summary Transaction Details Identities SettingChallengesSmart Card About ✓ Banking verified. Mobile out-of-band transaction verification enables users to raise concern about potential fraud or confirm the legitimacy of transactions. Secure Customer & Enterprise Accounts From securing corporate bank accounts to verifying business transactions, leverage mobile devices to review and approve critical transactions on a separate, secure channel. Defeat Malware & APTs Identity-assured transactions are a proven defense against malware, advanced persistent threats (APT) and other online fraud. Move transactions out-of-band to the mobile channel to review exact transaction details, and also provide real-time confirmation and approval from the convenience of a smartphone. Authenticate Web & Cloud Transactions The Mobile Smart Credential is an effective and elegant method to strongly secure digital identities, but also is used to safely authenticate Web or cloud transactions to defeat advanced malware and other nefarious attacks. Mobile Digital Signatures Streamline Business Internal business processes and customer-facing services often require legally binding digital signatures that are fundamental for day-to-day operations. But traditional methods are cumbersome, slow and fail to drive business. The Mobile Smart Credential helps organizations streamline business with strong, non-repudiated digital signatures — right from a mobile device. Create Legally Binding Digital Signatures Any document or transaction that requires formal approval may be executed right from today’s most popular smartphones. The end-user’s secure, authenticated digital identity is used to create a digital signature that is both legally binding and provides trusted non-repudiated. Multiple Identities, One Device In certain situations, users may require support for multiple identities. With the Mobile Smart Credential, multiple identities may be stored in one smart credential identity container, eliminating the need for multiple smartcards and access credentials.
  • 4. Entrust IdentityGuard Cloud Services Mobile Smart Credential Transform Mobile Devices into Multipurpose Digital Identities Solution Advantages Entrust provides organizations a comprehensive solution that consolidates certificate and identity management, as well as all respective authentication requirements, within a single platform. By leveraging Mobile Smart Credentials, organizations are able to reduce cost and complexity, future-proof investment and integrate advanced technology for greater security. Future-Proof Solution Maximize your authentication investment by ensuring it’s flexible enough to leverage future security technology to help adapt to the next evolution of attacks. The framework extends identities to physical access, cloud-based applications and new authentication approaches as the technology, threat landscape and business needs evolve. Reduce TCO, Simplify Credential Provisioning By eliminating the need to issue and deliver physical authenticators and desktop smartcard readers, provisioning efforts, cost and daily management are greatly reduced. The solution provides simple over-the-air provisioning (OTA) and helps streamline user enrollment and self-recovery. Authentication Policies Entrust’s framework provides support for varied authentication policies across different user communities (e.g., internal departments, customers or partners) and gives the ability to change a user’s authenticator with minimal cost or effort should business needs or security threats dictate. The approach empowers organizations to dynamically evolve to address advanced identity threats in real time. Business Made Efficient Deploying identities on mobile devices provides a number of business opportunities to eliminate cumbersome and costly paper-based processes for formal approvals. Mobile digital signatures speed the pace of business and deliver convenient methods for employees and customers to provide approval or verification of transactions, communication and other sensitive information. Automatic Credential Detection Remove the human element by leveraging Entrust’s automatic workstation logout features, which engage when an end-user leaves the premise, desk or work area. With Bluetooth and NFC integration, the solution automatically detects mobile devices with embedded credentials. The solution asks the user to enter their PIN when they approach their workstation, removing the outdated need to enter usernames and passwords. Defeat Advanced Malware The Entrust IdentityGuard Mobile Smart Credential provides the best line of defense against malware-based attacks (e.g., man-in-the-browser) and opens the door for streamlining business processes with anywhere, anytime mobile digital signatures. Mobile devices provide a separate channel from user desktops and may be leveraged for out-of-band transaction verification to defeat malware-based threats such as man-in-the-browser and other malicious attacks (e.g., Trojan variations).
  • 5. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved. Company Facts Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA 24566/2-14 Entrust IdentityGuard Cloud Services Mobile Smart Credential Transform Mobile Devices into Multipurpose Digital Identities Entrust IdentityGuard Cloud Services Entrust IdentityGuard Cloud Services is a comprehensive cloud-based solution that offers Entrust’s complete line of identity-based security solutions. Manage all identities and certificates — related to SSL, smart credentials, device certificates, PKI and certificate discovery — right from a single cloud interface. This approach provides a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud. Entrust IdentityGuard Cloud Services šš SSL šš Smart Credentials šš Device Certificates šš PKI šš Discovery NFC & Bluetooth Integration Taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust embeds biometrics and digital certificates on smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication. Authenticated desktop logins are as simple as having a mobile device in proximity to a workstation. Proximity-Based Logout Entrust offers proximity-based automatic logout that helps increase security — a critical capability for organizations that require shared workstations (e.g., doctors, stock traders). Solution Advantages