card

Results 226 - 250 of 454Sort Results By: Published Date | Title | Company Name

Entrust IdentityGuard Cloud Services Discovery Certificate Discovery & Management Solution

Published By: Entrust Datacard     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.
Tags : 
identity guard, cloud service, certificate discovery, management solution, security, data management
    
Entrust Datacard

Entrust IdentityGuard Cloud Services Device Certificates Securing Mobile Identities & Devices

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : 
identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
    
Entrust Datacard

Entrust IdentityGuard Cloud Services PKI Securing Mobile Identities & Devices

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : 
identity guard, cloud services, pki, secure, mobile identities, devices, security
    
Entrust Datacard

Device Certificates: Identity Authentication in a Mobile World

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard

Beyond Passwords & Outdated Physical Access Systems: How Smart Credentials Change Security

Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard

Deploying Advanced Authentication for CJIS Compliance

Published By: Entrust Datacard     Published Date: Jul 21, 2014
To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.
Tags : 
authentication, cjis, compliance, sensitive information, security, controls, fbi, policy
    
Entrust Datacard

Strong Identity Authentication for First Responders: Entrust Solutions for Compliance with FRAC

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : 
identity, authentication, first responders, u.s. homeland security, frac
    
Entrust Datacard

Advanced Solutions for Critical Infrastructure Protection

Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : 
solution, infrastructure protection, avoid non-compliance, cyberattack, security
    
Entrust Datacard

Strong Authentication for Healthcare: Entrust Solutions for Centers for Medicare & Medicaid Services

Published By: Entrust Datacard     Published Date: Jul 21, 2014
As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.
Tags : 
authentication, healthcare, medicine, identity, security, cms system
    
Entrust Datacard

Entrust Private SSL Certificates: Enabling Continued Use of Non-Registered Domain Names

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015.
Tags : 
ssl certifications, fqdn, non-registered names
    
Entrust Datacard

Guidance on Non-FQDNs: The Deprecation of Internal Server Names and Reserved IP Addresses

Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : 
identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
    
Entrust Datacard

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions, ev multi-domain, security
    
Entrust Datacard

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard

Mapping the Path of Two-Factor Authentication

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset.
Tags : 
mapping, two-factor authentication, indispensable asset, cybersphere, identities, sensitive information, security
    
Entrust Datacard

Tracing Key Moments in the History of Malware

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach.
Tags : 
history, malware, cybercrime, global, attacks, virtual threat, defense, security
    
Entrust Datacard

CJIS Compliance Solutions

Published By: Entrust Datacard     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication, security
    
Entrust Datacard

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
    
Entrust Datacard

Why Mobile is the Next Digital Identity

Published By: Entrust Datacard     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : 
mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc, security, data management
    
Entrust Datacard

Cybersecurity 101 for Small & Medium Businesses

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities.
Tags : 
cybersecurity, small and medium businessess, technology, protect, smbs, security
    
Entrust Datacard

Switch to SHA-2

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl, network security, business intelligence, business technology
    
Entrust Datacard

Tracing Key Moments in the History of Malware

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet, botnets, zeus, blackhole, fraud, credentials, digital, information, security, monitoring, network security, business intelligence, business technology
    
Entrust Datacard

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

Cybersecurity 101 for Small & Medium Businesses

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.