SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
+1-888-690-2424
entrust@entrust.com
entrust.com/mobile

Mobile Security Solutions

@Entrust

Securing Mobile Identities, Devices & Transactions

+entrust

The proliferation of mobile devices is front and center for organizations
in both employee and customer communities.

/EntrustVideo
/EntrustSecurity

Entrust not only helps secure mobile identities and transactions, but
also empowers organizations to leverage mobile devices to improve
overall security and streamline business processes. Security controls
are increased across all channels, enabling more convenience for
employees and customers alike.

The BYOD Surge

Securing the Enterprise

As the use of mobile devices and applications
grows — and bring-your-own-device (BYOD)
initiatives become more commonplace —
organizations are challenged with properly
authenticating both employee-owned
and company-issued mobile devices that
access corporate systems, data and
customer accounts.

Secured mobile devices are effective,
popular and may be leveraged as a virtual
employee identity to securely access
computers, applications, cloud services
and even physical doors. In high-risk
situations, mobile may be leveraged to
provide identity-assured transactions that
effectively defeat malware-based attacks.

DOWNLOAD
THIS DATA SHEET

Service Benefits

Serves as a comprehensive solution
	 that addresses all your mobile needs

šš

Strengthens security controls across
	 the enterprise while offering
	 seamless integration and improved
	 end-user experience

šš

uu
entrust.com/enterprise

Mobile Wins Customers,
Improves Business
To effectively mitigate risk, enable true
efficiency and satisfy customers in the mobile
environment, organizations must properly
secure mobile devices — but in a way that
minimizes user barrier and frustrations.
Once secured, organizations have the
opportunity to leverage mobile devices
to actually improve security in other
parts of the business.

šš

Customer Protection

šš

Smartphones may be used to empower
customers to better secure online
transactions and defeat malicious fraud
attacks that attempt to highjack customer
accounts. This movement holds the promise
of safe, convenient and always-in-hand
solutions to secure identities and transactions
across various environments.

Secures mobile identities, devices,
	 applications and transactions
Defeats the most advanced fraud
	 threats with identity-assured
	 transactions that enhance your
	 mobile brand

šš

R
 oll out mobile-based services
that leverage mobile identities
to improve business efficiency
and client interactions

šš

U
 se flexible deployment options
to meet specific needs

šš

D
 eployed as an integral element
of Entrust IdentityGuard to address
the identity security needs of today
and tomorrow

uu
entrust.com/mobile
Mobile Security Solutions
Securing Mobile Identities, Devices  Transactions

Secure Mobile, Leverage Mobile
Entrust’s two-pronged approach — first secure the device, then leverage it to improve security
— is an effective method to reduce business risk and introduce new, innovative transactional
services that improve the user experience for customers and employees. It’s a true differentiator
in an already competitive marketplace.
Entrust offers a number of capabilities that not only help secure mobile identities and transactions,
but also empower organizations to leverage mobile devices to improve overall security and
streamline business processes. Security controls are increased across all channels, enabling
more convenience for employees and customers alike.

SECURE MOBILE

LEVERAGE MOBILE

IDENTITIES  TRANSACTIONS

FOR THE ONLINE CHANNEL

DEVICE CERTIFICATES

STRONG AUTHENTICATION
LOGIN

MDM INTEGRATION

APPLICATION PROTECTION

ANALYTICS

MDM

DESKTOP MALWARE PROTECTION

MOBILE SMART CREDENTIAL

TRANSACTION-SIGNING

Powered by Entrust IdentityGuard. Entrust's comprehensive mobile security solutions help organizations effectively strengthen security, simplify ease of use and improve efficiency.
Secure Mobile Identities  Transactions
With the huge dependence on mobile to execute business operations, organizations
are provisioning solutions that not only address security needs, but also ensure the mobile
experience is simple and unencumbered.
Entrust solutions authenticate mobile devices connecting to a network, encrypt and digitally
sign mobile email communication, embed identity protection into mobile applications, and
monitor transactions to detect fraudulent or unauthorized activity. Entrust also offers a range
of on-premise, hosted and pre-integrated mobile device management (MDM) capabilities
to suit your needs.

DEVICE CERTIFICATES

APPLICATION PROTECTION

USE CASE

USE CASE

Enterprise Mobility  BYOD

Mobile Applications for Customer
 Enterprise Environments

Verify who’s connecting to networks by
provisioning mobile-based digital certificates
to secure access to corporate Wi-Fi and VPNs,
and encrypt mobile email communication.

Leverage Entrust’s software development
kits (SDK) to embed certificate-based or
transparent one-time passcode (OTP) security
right into mobile applications.

Device certificates may be distributed
via a number of convenient methods,
including cloud-based services from
Entrust IdentityGuard, to help enable strong
mobile security and ensure compliance.

MDM INTEGRATION

This strong user authentication is transparent
to the end-user (i.e., no more passwords), helps
defend against distributed denial of service
(DDOS) attacks and restricts access to trusted
mobile applications.

ANALYTICS

USE CASE
MDM

USE CASE

Enterprise Mobility  MDM

Monitor Mobile Transactions for
High-Risk or Suspicious Activity

Extend the value of digital certificates with
automatic certificate provisioning via established
MDM policy.
Leverage Entrust’s rich API suite or pre-built
integration with the top MDM vendors,
including AirWatch, MobileIron and Good
Technology, to combine the benefits of MDM
with strong device identities.

Use real-time monitoring and intervention
to identify and stop suspicious or high-risk
transactions that stem from the both the mobile
and online channels.
Entrust builds user behavior profiles that may
be used to protect mobile transactions, such as
money transfers, payments, stock trades or even
changes in account information.
Mobile Security Solutions
Securing Mobile Identities, Devices  Transactions

Leverage Mobile for the Online Channel
Using mobile devices for strong authentication and identity-assured transactions is the secure,
practical and cost-effective approach to enable organizations to unlock the power of mobile
computing. Entrust offers a number of solutions to defeat malware and secure access to logical,
cloud and physical resources.

STRONG AUTHENTICATION

MOBILE SMART CREDENTIAL

USE CASE

USE CASE

Online Access to Customer
 Enterprise Applications

Mobile Enterprise Credentials for
Physical, Logical  Cloud Access

Deploy mobile-based, one-time passcodes (OTP),
grid cards or SMS OTPs to strongly authenticate
identities that require two-factor access controls
to either customer-facing or enterprise-based
Web applications.

Eliminate hardware tokens, passwords and
physical access cards with an always-on-hand
smartphone. Embed smart credentials on
employee smartphones to create trusted
identity credentials for stronger, more
convenient enterprise authentication.

Eliminate the cost and complexity of hard tokens
with secure, over-the-air (OTA) provisioning to
mobile end-points.

DESKTOP MALWARE PROTECTION

Mobile smart credentials use near-field
communication (NFC) or Bluetooth standards
to securely access computer workstations,
network resources, data, cloud applications,
physical doors or buildings, and also enable users
to digitally sign transactions and encrypt data.

TRANSACTION-SIGNING

USE CASE

USE CASE

Commercial Banking

Commercial  Retail Banking

Enterprise Fraud Threats

Enterprise Workflow Efficiency

Stop fraud attacks that target critical assets such
as online banking, e-commerce, cloud services
and even employee desktops. Identity-assured
transactions stop desktop malware and sessionriding attacks, securing the enterprise and
customer data.

Deploy mobile-based smart credentials to
implement qualified digital signatures to legally
authorize transactions, increase efficiency and
enable new business services in both enterprise
and customers processes.

Leverage mobile applications to confirm
transactions on secure channels that are far
more secure and simple to use than basic
approaches such as SMS. In addition, leverage
transaction verification to offer easy-to-use,
anywhere, anytime dual-control services.

With mobile-based digital signing built into
mobile applications, organizations eliminate
the need for complex client-side software and
expensive signing tokens — all while delighting
customers with new, convenient services.
The True Identity Platform
Entrust’s mobile security solutions are an integral element of the Entrust IdentityGuard software
authentication platform — an enterprise-wide solution that solves the identity challenge once
and for all. Whether by placing smart credentials directly on user smartphones or by leveraging
one of the many options afforded by Entrust IdentityGuard, Entrust helps organizations embrace
the ubiquity of mobile devices within any given environment.

  Identity-Based Security Framework

X 010

Physical/Logical Access

Mobile

Cloud

Transaction-Signing

User Self-Service

SOFTWARE AUTHENTICATION PLATFORM

Risk-Based Policies

Comprehensive
Integration

Seamless
Co-Deployment

More Flexibility, More Control
Your Brand, Our SDKs
Entrust's easy-to-use software development kits (SDK) help
organizations create customized or branded mobile authentication
applications tailored to the requirements of a specific environment.
Entrust’s authentication capabilities may be embedded transparently
into existing mobile applications, further simplifying both security
and the user experience.
Multiple Identities, One Device
Embrace the power of mobile efficiency by enabling multiple
digital identities on a single device or even distinct identities sharing
a device. This provides independent activation and control, plus
customization that ensures brand integrity remains intact.

Advanced APIs

Authenticator Suite

Popular Platforms
Entrust’s mobile solutions are available on today’s leading mobile
platforms, including Apple iOS, Google Android and BlackBerry.
Critical Security, Convenient Controls
Entrust mobile security solutions are available in two core identity
formats, including digital certificates or OATH-based OTP controls,
and provide organizations with the flexibility in addressing evolving
business needs.
Embed forced-PIN control to protect access to mobile applications
or implement policies to detect when a user device has been
jailbroken, which could lead to a critical void in security. Entrust
also supports a rich suite of over-the-air provisioning and user
self-service capabilities that can be integrated into onboarding
and distribution processes.
Mobile Security Solutions
Securing Mobile Identities, Devices  Transactions

Ultimate Versatility
Any Authenticator, One Platform
Entrust's diverse set of authentication capabilities include smartcards and USB tokens, soft
tokens, grid cards and eGrids, IP-geolocation, questions and answers, mobile smart credentials,
out-of-band one-time passcode (delivered via voice, SMS or email), out-of-band transaction
verification and a range of one-time-passcode tokens.
Mobile Self-Help
Via the secure, Web-based Entrust IdentityGuard Self-Service Module, end-users may manage
many aspects of their accounts — device enrollment, obtaining certificates, provisioning and
more — freeing administrator time without compromising the security of the network.
Rich APIs  Application Integration
Entrust’s open API architecture allows for tight integration with today's leading mobile
device management (MDM), identity access management (IAM) and public key infrastructure
(PKI) vendors. This enables Entrust IdentityGuard to work with new and existing enterprise
implementations, plus adds the ability to integrate in-house or managed service-based digital
certificates.

Entrust offers a number
of capabilities that
not only help secure
mobile identities and
transactions, but also
empower organizations
to leverage mobile
devices to improve
overall security and
streamline business.
 

Identities from the Cloud
Entrust offers cloud-based services to enable any organization to seamlessly provision and
manage digital certificates and identities — for both users and mobile devices — without
standing up their own certificate infrastructure. This approach reduces costs, increases
efficiency and simplifies setup and deployment.
Future-Proofed
Be ready for what’s next. Entrust’s versatile platform approach enables organizations
to introduce or change mobile security controls — camera, voice channel, GPS or
touch patterns, for example — with little or no adverse effects on the environment
or user population.

A trusted provider of identity-based security solutions, Entrust secures governments,
enterprises and financial institutions in more than 5,000 organizations spanning
85 countries.
Entrust’s award-winning software authentication platforms manage today’s most secure
identity credentials, addressing customer pain points for cloud and mobile security,
physical and logical access, citizen eID initiatives, certificate management and SSL.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.

Company Facts
Website: www.entrust.com
Employees: 359
Customers: 5,000
Offices: 10 globally
Headquarters
Three Lincoln Centre
5430 LBJ Freeway, Suite 1250
Dallas, TX 75240 USA

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust
product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos
are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved.
24317/1-14

Contenu connexe

Tendances

Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Arnaud Mathieu
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study
TeleSign - Citrix ShareFile - Two-Factor Authentication Case StudyTeleSign - Citrix ShareFile - Two-Factor Authentication Case Study
TeleSign - Citrix ShareFile - Two-Factor Authentication Case StudyTeleSign Corporation
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief Mestizo Enterprises
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 

Tendances (20)

Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study
TeleSign - Citrix ShareFile - Two-Factor Authentication Case StudyTeleSign - Citrix ShareFile - Two-Factor Authentication Case Study
TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 

Similaire à Entrust Mobile Security Solutions

Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? The TNS Group
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptxinfosec train
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company BrochureDictao
 
Presentación microestrategy en Networking Day moviforum
Presentación microestrategy en Networking Day moviforumPresentación microestrategy en Networking Day moviforum
Presentación microestrategy en Networking Day moviforumvideos
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptPulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptKendraJohnson54
 

Similaire à Entrust Mobile Security Solutions (20)

Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID?
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
Presentación microestrategy en Networking Day moviforum
Presentación microestrategy en Networking Day moviforumPresentación microestrategy en Networking Day moviforum
Presentación microestrategy en Networking Day moviforum
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptPulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
 

Plus de Entrust Datacard

INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesEntrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 
INFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsEntrust Datacard
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 

Plus de Entrust Datacard (9)

INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 
INFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of Things
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 

Dernier

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Entrust Mobile Security Solutions

  • 1. +1-888-690-2424 entrust@entrust.com entrust.com/mobile Mobile Security Solutions @Entrust Securing Mobile Identities, Devices & Transactions +entrust The proliferation of mobile devices is front and center for organizations in both employee and customer communities. /EntrustVideo /EntrustSecurity Entrust not only helps secure mobile identities and transactions, but also empowers organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike. The BYOD Surge Securing the Enterprise As the use of mobile devices and applications grows — and bring-your-own-device (BYOD) initiatives become more commonplace — organizations are challenged with properly authenticating both employee-owned and company-issued mobile devices that access corporate systems, data and customer accounts. Secured mobile devices are effective, popular and may be leveraged as a virtual employee identity to securely access computers, applications, cloud services and even physical doors. In high-risk situations, mobile may be leveraged to provide identity-assured transactions that effectively defeat malware-based attacks. DOWNLOAD THIS DATA SHEET Service Benefits Serves as a comprehensive solution that addresses all your mobile needs šš Strengthens security controls across the enterprise while offering seamless integration and improved end-user experience šš uu entrust.com/enterprise Mobile Wins Customers, Improves Business To effectively mitigate risk, enable true efficiency and satisfy customers in the mobile environment, organizations must properly secure mobile devices — but in a way that minimizes user barrier and frustrations. Once secured, organizations have the opportunity to leverage mobile devices to actually improve security in other parts of the business. šš Customer Protection šš Smartphones may be used to empower customers to better secure online transactions and defeat malicious fraud attacks that attempt to highjack customer accounts. This movement holds the promise of safe, convenient and always-in-hand solutions to secure identities and transactions across various environments. Secures mobile identities, devices, applications and transactions Defeats the most advanced fraud threats with identity-assured transactions that enhance your mobile brand šš R oll out mobile-based services that leverage mobile identities to improve business efficiency and client interactions šš U se flexible deployment options to meet specific needs šš D eployed as an integral element of Entrust IdentityGuard to address the identity security needs of today and tomorrow uu entrust.com/mobile
  • 2. Mobile Security Solutions Securing Mobile Identities, Devices Transactions Secure Mobile, Leverage Mobile Entrust’s two-pronged approach — first secure the device, then leverage it to improve security — is an effective method to reduce business risk and introduce new, innovative transactional services that improve the user experience for customers and employees. It’s a true differentiator in an already competitive marketplace. Entrust offers a number of capabilities that not only help secure mobile identities and transactions, but also empower organizations to leverage mobile devices to improve overall security and streamline business processes. Security controls are increased across all channels, enabling more convenience for employees and customers alike. SECURE MOBILE LEVERAGE MOBILE IDENTITIES TRANSACTIONS FOR THE ONLINE CHANNEL DEVICE CERTIFICATES STRONG AUTHENTICATION LOGIN MDM INTEGRATION APPLICATION PROTECTION ANALYTICS MDM DESKTOP MALWARE PROTECTION MOBILE SMART CREDENTIAL TRANSACTION-SIGNING Powered by Entrust IdentityGuard. Entrust's comprehensive mobile security solutions help organizations effectively strengthen security, simplify ease of use and improve efficiency.
  • 3. Secure Mobile Identities Transactions With the huge dependence on mobile to execute business operations, organizations are provisioning solutions that not only address security needs, but also ensure the mobile experience is simple and unencumbered. Entrust solutions authenticate mobile devices connecting to a network, encrypt and digitally sign mobile email communication, embed identity protection into mobile applications, and monitor transactions to detect fraudulent or unauthorized activity. Entrust also offers a range of on-premise, hosted and pre-integrated mobile device management (MDM) capabilities to suit your needs. DEVICE CERTIFICATES APPLICATION PROTECTION USE CASE USE CASE Enterprise Mobility BYOD Mobile Applications for Customer Enterprise Environments Verify who’s connecting to networks by provisioning mobile-based digital certificates to secure access to corporate Wi-Fi and VPNs, and encrypt mobile email communication. Leverage Entrust’s software development kits (SDK) to embed certificate-based or transparent one-time passcode (OTP) security right into mobile applications. Device certificates may be distributed via a number of convenient methods, including cloud-based services from Entrust IdentityGuard, to help enable strong mobile security and ensure compliance. MDM INTEGRATION This strong user authentication is transparent to the end-user (i.e., no more passwords), helps defend against distributed denial of service (DDOS) attacks and restricts access to trusted mobile applications. ANALYTICS USE CASE MDM USE CASE Enterprise Mobility MDM Monitor Mobile Transactions for High-Risk or Suspicious Activity Extend the value of digital certificates with automatic certificate provisioning via established MDM policy. Leverage Entrust’s rich API suite or pre-built integration with the top MDM vendors, including AirWatch, MobileIron and Good Technology, to combine the benefits of MDM with strong device identities. Use real-time monitoring and intervention to identify and stop suspicious or high-risk transactions that stem from the both the mobile and online channels. Entrust builds user behavior profiles that may be used to protect mobile transactions, such as money transfers, payments, stock trades or even changes in account information.
  • 4. Mobile Security Solutions Securing Mobile Identities, Devices Transactions Leverage Mobile for the Online Channel Using mobile devices for strong authentication and identity-assured transactions is the secure, practical and cost-effective approach to enable organizations to unlock the power of mobile computing. Entrust offers a number of solutions to defeat malware and secure access to logical, cloud and physical resources. STRONG AUTHENTICATION MOBILE SMART CREDENTIAL USE CASE USE CASE Online Access to Customer Enterprise Applications Mobile Enterprise Credentials for Physical, Logical Cloud Access Deploy mobile-based, one-time passcodes (OTP), grid cards or SMS OTPs to strongly authenticate identities that require two-factor access controls to either customer-facing or enterprise-based Web applications. Eliminate hardware tokens, passwords and physical access cards with an always-on-hand smartphone. Embed smart credentials on employee smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication. Eliminate the cost and complexity of hard tokens with secure, over-the-air (OTA) provisioning to mobile end-points. DESKTOP MALWARE PROTECTION Mobile smart credentials use near-field communication (NFC) or Bluetooth standards to securely access computer workstations, network resources, data, cloud applications, physical doors or buildings, and also enable users to digitally sign transactions and encrypt data. TRANSACTION-SIGNING USE CASE USE CASE Commercial Banking Commercial Retail Banking Enterprise Fraud Threats Enterprise Workflow Efficiency Stop fraud attacks that target critical assets such as online banking, e-commerce, cloud services and even employee desktops. Identity-assured transactions stop desktop malware and sessionriding attacks, securing the enterprise and customer data. Deploy mobile-based smart credentials to implement qualified digital signatures to legally authorize transactions, increase efficiency and enable new business services in both enterprise and customers processes. Leverage mobile applications to confirm transactions on secure channels that are far more secure and simple to use than basic approaches such as SMS. In addition, leverage transaction verification to offer easy-to-use, anywhere, anytime dual-control services. With mobile-based digital signing built into mobile applications, organizations eliminate the need for complex client-side software and expensive signing tokens — all while delighting customers with new, convenient services.
  • 5. The True Identity Platform Entrust’s mobile security solutions are an integral element of the Entrust IdentityGuard software authentication platform — an enterprise-wide solution that solves the identity challenge once and for all. Whether by placing smart credentials directly on user smartphones or by leveraging one of the many options afforded by Entrust IdentityGuard, Entrust helps organizations embrace the ubiquity of mobile devices within any given environment.   Identity-Based Security Framework X 010 Physical/Logical Access Mobile Cloud Transaction-Signing User Self-Service SOFTWARE AUTHENTICATION PLATFORM Risk-Based Policies Comprehensive Integration Seamless Co-Deployment More Flexibility, More Control Your Brand, Our SDKs Entrust's easy-to-use software development kits (SDK) help organizations create customized or branded mobile authentication applications tailored to the requirements of a specific environment. Entrust’s authentication capabilities may be embedded transparently into existing mobile applications, further simplifying both security and the user experience. Multiple Identities, One Device Embrace the power of mobile efficiency by enabling multiple digital identities on a single device or even distinct identities sharing a device. This provides independent activation and control, plus customization that ensures brand integrity remains intact. Advanced APIs Authenticator Suite Popular Platforms Entrust’s mobile solutions are available on today’s leading mobile platforms, including Apple iOS, Google Android and BlackBerry. Critical Security, Convenient Controls Entrust mobile security solutions are available in two core identity formats, including digital certificates or OATH-based OTP controls, and provide organizations with the flexibility in addressing evolving business needs. Embed forced-PIN control to protect access to mobile applications or implement policies to detect when a user device has been jailbroken, which could lead to a critical void in security. Entrust also supports a rich suite of over-the-air provisioning and user self-service capabilities that can be integrated into onboarding and distribution processes.
  • 6. Mobile Security Solutions Securing Mobile Identities, Devices Transactions Ultimate Versatility Any Authenticator, One Platform Entrust's diverse set of authentication capabilities include smartcards and USB tokens, soft tokens, grid cards and eGrids, IP-geolocation, questions and answers, mobile smart credentials, out-of-band one-time passcode (delivered via voice, SMS or email), out-of-band transaction verification and a range of one-time-passcode tokens. Mobile Self-Help Via the secure, Web-based Entrust IdentityGuard Self-Service Module, end-users may manage many aspects of their accounts — device enrollment, obtaining certificates, provisioning and more — freeing administrator time without compromising the security of the network. Rich APIs Application Integration Entrust’s open API architecture allows for tight integration with today's leading mobile device management (MDM), identity access management (IAM) and public key infrastructure (PKI) vendors. This enables Entrust IdentityGuard to work with new and existing enterprise implementations, plus adds the ability to integrate in-house or managed service-based digital certificates. Entrust offers a number of capabilities that not only help secure mobile identities and transactions, but also empower organizations to leverage mobile devices to improve overall security and streamline business.   Identities from the Cloud Entrust offers cloud-based services to enable any organization to seamlessly provision and manage digital certificates and identities — for both users and mobile devices — without standing up their own certificate infrastructure. This approach reduces costs, increases efficiency and simplifies setup and deployment. Future-Proofed Be ready for what’s next. Entrust’s versatile platform approach enables organizations to introduce or change mobile security controls — camera, voice channel, GPS or touch patterns, for example — with little or no adverse effects on the environment or user population. A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Company Facts Website: www.entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2014 Entrust. All rights reserved. 24317/1-14