SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Entrust IdentityGuard: Federation Module
Manage & Secure Access to Cloud-Based Services and Networks
via Existing User Credentials
                                                                                            Solution Benefits
Organizations are increasingly moving toward cloud and software-as-a-service (SaaS)         •	 Leverage organizational identities to
applications. In many cases, they are forced to create a new set of identity credentials       access cloud and inter- and intra-network
for end-users and, typically, these identities are based on insecure, outdated                 applications
username and password approaches.                                                           •	 Reduce the number of IDs per user

As organizations move more services to the cloud — such as email, CRM and other             •	 Single sign-on (SSO) across multiple services
applications — the number of user identities grows at an exponential rate.                  •	 Integration with SaaS/cloud services
                                                                                               (e.g., Microsoft 365, Salesforce.com)
This leaves end-users with the burden of managing multiple usernames and                    •	 Standards-based approach simplifies
passwords for each service, not only causing frustration but also hindering security           integration (e.g., SAML and OpenID
effectiveness. This approach introduces many obstacles.                                        identity providers)
                                                                                            •	 Strong second-factor authentication
                                                                                               to cloud-based services
  •	 Forgotten usernames and passwords, a frustrating experience that drives                •	 Widest range of cost-effective
    password reuse, thus reducing overall security                                             authentication methods to meet
  •	 Adhering to many differing password policies required by the SaaS/cloud provider          unique user requirements

  •	 Passwords are a weak form of authentication that have low upfront costs,               •	 Flexible to meet current and future
                                                                                               security priorities
    but a high total cost of ownership (TCO) and inherent security risks
                                                                                            •	 Based on award-winning
                                                                                               Entrust IdentityGuard software
                                                                                               authentication platform
Secure Network Expansion
In addition to cloud access, organizations extend access to their networks with
the goal of increasing productivity and streamlining business. But, in doing so,
organizations may need to implement an entirely new user-access infrastructure.

Unfortunately, this likely introduces another set of usernames and passwords for
end‑users to manage. While the use cases of inter- and intra-company access and cloud
differ slightly, the constant thread is the need to provide consistent and secure access.

Simple username and password authentication is insufficient protection
against unauthorized access to cloud-based services. A strong second factor
of authentication is required to properly authenticate individuals accessing
cloud‑based services to protect from theft or altering of sensitive information.

The type of authenticator used, its strength and total cost may be different
depending on what it is protecting, the usability requirements of the officers and
budgetary constraints.
COMPREHENSIVE FEDERATION OF USER IDENTITIES
An extension to the Entrust IdentityGuard software authentication platform, the Entrust IdentityGuard Federation Module allows
organizations to manage and secure access to cloud-based services by federating existing user credentials.

The solution enables organizations to federate identities                  Organizations may integrate with some of the most popular
to securely access other networks (e.g., partnering                        cloud-based services (e.g., Microsoft 365, Salesforce.com),
organizations), reducing reliance on usernames and                         which allows end-users to have consistent, simple and secure
passwords, as well as improving both security and the                      access to cloud-based services or other organizations.
end‑user experience.



FEDERATION MODULE: HOW IT WORKS
The Entrust IdentityGuard Federation Module enables secure access to a variety of distinct networks — whether they are within the
organization or are external (e.g., cloud services, and/or a partnering organization). Simply, organizations require a secure means
to access information contained within these entities.

Leverage Existing Digital IDs                                              Extend Security Investment
The Federation Module allows users to leverage existing                    Unlike other federation solutions on the market, Entrust’s
corporate IDs to access specific external network segments                 federation module is based on the award-winning Entrust
and cloud-based services — all without having to introduce                 IdentityGuard software authentication platform, which
or issue another set of identity credentials. The solution                 enables organizations to inherit the strong identity offerings
is based on industry-wide standards such as SAML and                       already provided by the platform.
OpenID, allowing organizations the assurance of integration,
compatibility and future extensibility.




                                                                   Cloud



             Physical/Logical Access      Mobile                                        Transaction Signing      User Self-Service


                                                                       SOFTWARE AUTHENTICATION PLATFORM


           Comprehensive Integration   Advanced APIs        Seamless Co-Deployment     Flexible Policy Engine   Authenticator Suite
AWARD-WINNING AUTHENTICATION PLATFORM
Entrust IdentityGuard secures cloud and network access for many of the world’s leading enterprises, governments and financial
institutions. It serves as an organization’s single comprehensive user authentication platform and authenticates identities prior to
accessing sensitive cloud-based services or computer networks.

All Authenticators, One Platform                                                            Evolve to Address New Risks
Entrust IdentityGuard offers a broad range of user authentication                           This approach provides a single point of administration,
methods including physical (e.g., a one‑time‑passcode token                                 regardless of the authentication option or combination
or grid card), mobile- and smartcard-based, or online                                       of options deployed.
(e.g., passwords plus questions and answers).
                                                                                            Organizations are able to evolve and change authentication
Organizations may deploy authentication methods that                                        methods over time as the risks and the operating
are convenient and simple to use, ensure strong user                                        environment change.
authentication of the user, and meet the budgetary
requirements of the organization.




                                                                                   Transaction
                                                                                   Verification        Mobile Device
                                                          Mobile Soft Token                             Certificates
                                                                                                                             Mobile Smart
                                          SMS                                                                                 Credential

                       Device
                                                                                           2
                                                                                                                                              Smartcards
                    Authentication                                                Grid / eGrid                                                 and USB
                                                                 Knowledge
                                                                   Based                              OTP Tokens
                                            2.16.191.253.108

         LOGIN                                  IP-Geolocation                                                           Digital                           Transaction
         Password                                                                                                      Certificates                          Signing

                                  Mutual
                               Authentication                                                                                         Biometrics


                                                  Software Authentication Platform
Entrust’s flagship authentication solution, Entrust IdentityGuard continues to lead the industry as one of the most robust software authentication platforms,
delivering an unmatched breadth of capabilities and flexibility to meet the most demanding security environments.
Evaluating Security Needs
The traditional authentication method — a user providing                                                          Internal Security Evaluation
their username and password — is proven to be ineffective in
preventing unauthorized access. Entrust IdentityGuard allows                                                      •	 How sensitive is the information you are protecting?
organizations to require additional authentication prior to                                                       •	 What is the risk of a breach?
network access.
                                                                                                                  •	 Who will be using the authenticator and what are
All users are not created equal — nor do they need the same                                                          their unique requirements?
access. Entrust provides a range of authentication methods                                                        •	 Do you want authentication to be transparent to
to ensure an organization’s unique requirements are met.                                                             the user or can the user carry a physical device?
The type of authenticators used is based on an evaluation
                                                                                                                  •	 Can you leverage the user’s mobile device?
of the organization and their requirements.
                                                                                                                  •	 Do you want to use the same authenticator for
Once issued, this second factor of authentication will be                                                            physical access?
required (in addition to their username and password) when
a user attempts to access a secure network. This helps strongly
authenticate the identity of the individual and prevent
unauthorized access.



Entrust & You                                                                                                 A trusted provider of identity-based security solutions,
More than ever, Entrust understands your organization’s                                                       Entrust empowers governments, enterprises and financial
security pain points. Whether it’s the protection of information,                                             institutions in more than 5,000 organizations spanning 85
securing online customers, regulatory compliance or large-scale                                               countries. Entrust’s award-winning software authentication
government projects.                                                                                          platforms manage today’s most secure identity credentials,
                                                                                                              addressing customer pain points for cloud and mobile security,
Entrust provides identity-based security solutions that are not                                               physical and logical access, citizen eID initiatives, certificate
only proven in real-world environments, but cost-effective in                                                 management and SSL.
today’s uncertain economic climate.
                                                                                                              For more information on Entrust’s comprehensive portfolio of
                                                                                                              identity-based security solutions, contact the representative in
                                                                                                              your area at 888-690-2424 or visit entrust.com/federation.




About Entrust
A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning
85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud
and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services,
call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service
names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their
respective owners. © 2012 Entrust. All rights reserved.
                                                                                                                                                                                                    24640/12-12

Mais conteúdo relacionado

Mais de Entrust Datacard

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Mais de Entrust Datacard (7)

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Entrust IdentityGuard Federation

  • 1. Entrust IdentityGuard: Federation Module Manage & Secure Access to Cloud-Based Services and Networks via Existing User Credentials Solution Benefits Organizations are increasingly moving toward cloud and software-as-a-service (SaaS) • Leverage organizational identities to applications. In many cases, they are forced to create a new set of identity credentials access cloud and inter- and intra-network for end-users and, typically, these identities are based on insecure, outdated applications username and password approaches. • Reduce the number of IDs per user As organizations move more services to the cloud — such as email, CRM and other • Single sign-on (SSO) across multiple services applications — the number of user identities grows at an exponential rate. • Integration with SaaS/cloud services (e.g., Microsoft 365, Salesforce.com) This leaves end-users with the burden of managing multiple usernames and • Standards-based approach simplifies passwords for each service, not only causing frustration but also hindering security integration (e.g., SAML and OpenID effectiveness. This approach introduces many obstacles. identity providers) • Strong second-factor authentication to cloud-based services • Forgotten usernames and passwords, a frustrating experience that drives • Widest range of cost-effective password reuse, thus reducing overall security authentication methods to meet • Adhering to many differing password policies required by the SaaS/cloud provider unique user requirements • Passwords are a weak form of authentication that have low upfront costs, • Flexible to meet current and future security priorities but a high total cost of ownership (TCO) and inherent security risks • Based on award-winning Entrust IdentityGuard software authentication platform Secure Network Expansion In addition to cloud access, organizations extend access to their networks with the goal of increasing productivity and streamlining business. But, in doing so, organizations may need to implement an entirely new user-access infrastructure. Unfortunately, this likely introduces another set of usernames and passwords for end‑users to manage. While the use cases of inter- and intra-company access and cloud differ slightly, the constant thread is the need to provide consistent and secure access. Simple username and password authentication is insufficient protection against unauthorized access to cloud-based services. A strong second factor of authentication is required to properly authenticate individuals accessing cloud‑based services to protect from theft or altering of sensitive information. The type of authenticator used, its strength and total cost may be different depending on what it is protecting, the usability requirements of the officers and budgetary constraints.
  • 2. COMPREHENSIVE FEDERATION OF USER IDENTITIES An extension to the Entrust IdentityGuard software authentication platform, the Entrust IdentityGuard Federation Module allows organizations to manage and secure access to cloud-based services by federating existing user credentials. The solution enables organizations to federate identities Organizations may integrate with some of the most popular to securely access other networks (e.g., partnering cloud-based services (e.g., Microsoft 365, Salesforce.com), organizations), reducing reliance on usernames and which allows end-users to have consistent, simple and secure passwords, as well as improving both security and the access to cloud-based services or other organizations. end‑user experience. FEDERATION MODULE: HOW IT WORKS The Entrust IdentityGuard Federation Module enables secure access to a variety of distinct networks — whether they are within the organization or are external (e.g., cloud services, and/or a partnering organization). Simply, organizations require a secure means to access information contained within these entities. Leverage Existing Digital IDs Extend Security Investment The Federation Module allows users to leverage existing Unlike other federation solutions on the market, Entrust’s corporate IDs to access specific external network segments federation module is based on the award-winning Entrust and cloud-based services — all without having to introduce IdentityGuard software authentication platform, which or issue another set of identity credentials. The solution enables organizations to inherit the strong identity offerings is based on industry-wide standards such as SAML and already provided by the platform. OpenID, allowing organizations the assurance of integration, compatibility and future extensibility. Cloud Physical/Logical Access Mobile Transaction Signing User Self-Service SOFTWARE AUTHENTICATION PLATFORM Comprehensive Integration Advanced APIs Seamless Co-Deployment Flexible Policy Engine Authenticator Suite
  • 3. AWARD-WINNING AUTHENTICATION PLATFORM Entrust IdentityGuard secures cloud and network access for many of the world’s leading enterprises, governments and financial institutions. It serves as an organization’s single comprehensive user authentication platform and authenticates identities prior to accessing sensitive cloud-based services or computer networks. All Authenticators, One Platform Evolve to Address New Risks Entrust IdentityGuard offers a broad range of user authentication This approach provides a single point of administration, methods including physical (e.g., a one‑time‑passcode token regardless of the authentication option or combination or grid card), mobile- and smartcard-based, or online of options deployed. (e.g., passwords plus questions and answers). Organizations are able to evolve and change authentication Organizations may deploy authentication methods that methods over time as the risks and the operating are convenient and simple to use, ensure strong user environment change. authentication of the user, and meet the budgetary requirements of the organization. Transaction Verification Mobile Device Mobile Soft Token Certificates Mobile Smart SMS Credential Device 2 Smartcards Authentication Grid / eGrid and USB Knowledge Based OTP Tokens 2.16.191.253.108 LOGIN IP-Geolocation Digital Transaction Password Certificates Signing Mutual Authentication Biometrics Software Authentication Platform Entrust’s flagship authentication solution, Entrust IdentityGuard continues to lead the industry as one of the most robust software authentication platforms, delivering an unmatched breadth of capabilities and flexibility to meet the most demanding security environments.
  • 4. Evaluating Security Needs The traditional authentication method — a user providing Internal Security Evaluation their username and password — is proven to be ineffective in preventing unauthorized access. Entrust IdentityGuard allows • How sensitive is the information you are protecting? organizations to require additional authentication prior to • What is the risk of a breach? network access. • Who will be using the authenticator and what are All users are not created equal — nor do they need the same their unique requirements? access. Entrust provides a range of authentication methods • Do you want authentication to be transparent to to ensure an organization’s unique requirements are met. the user or can the user carry a physical device? The type of authenticators used is based on an evaluation • Can you leverage the user’s mobile device? of the organization and their requirements. • Do you want to use the same authenticator for Once issued, this second factor of authentication will be physical access? required (in addition to their username and password) when a user attempts to access a secure network. This helps strongly authenticate the identity of the individual and prevent unauthorized access. Entrust & You A trusted provider of identity-based security solutions, More than ever, Entrust understands your organization’s Entrust empowers governments, enterprises and financial security pain points. Whether it’s the protection of information, institutions in more than 5,000 organizations spanning 85 securing online customers, regulatory compliance or large-scale countries. Entrust’s award-winning software authentication government projects. platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, Entrust provides identity-based security solutions that are not physical and logical access, citizen eID initiatives, certificate only proven in real-world environments, but cost-effective in management and SSL. today’s uncertain economic climate. For more information on Entrust’s comprehensive portfolio of identity-based security solutions, contact the representative in your area at 888-690-2424 or visit entrust.com/federation. About Entrust A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2012 Entrust. All rights reserved. 24640/12-12