SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
AUTHENTICATION
SOLUTIONS
Trusted Identity:
The Foundation for
Business Transformation
AUTHENTICATION FOR EVOLVING DIGITAL BUSINESS
You understand the necessity of business transformation — and you’re
developing and deploying plans to get there. After all, since 2000, more than
50% of the Fortune 500 companies have either slipped off that list or are gone
altogether. The most common reason was failure to “go digital.”
A foundational element of success for your digital business plans is trusted
identity. More and more of your employees are truly mobile. Your customers
and partners expect to be connected by secure and accessible digital
ecosystems. Even the processes you use to develop your offerings and bring
them to market are undergoing a digital transformation.
A key to proving your digital business with bold enablement and serious
security is choosing the right authentication solution partner. Entrust Datacard
has been a leader in trusted identity for more than 20 years. Today, our
authentication solutions are leveraged by growing enterprises that know all
business is becoming digital business.
BUILD YOUR DIGITAL BUSINESS —
BREADTH, DEPTH & FLEXIBILITY
The breadth of our portfolio — including on-premises, virtual appliance and
cloud-based authentication solutions — allows you to trust one solution partner
for all of your identity needs. And our commitment to continuous innovation
means we are with you every step of the way, from where you are today to the
realization of your ideal digital enterprise.
connected
7.6B
75B
2020
BY
mobile
24B
connected
people
devices
devices
Authentication Solutions
Trusted Identity: The Foundation for Business Transformation
ADVANCED ANALYTICS AND ADAPTIVE AUTHENTICATION CAPABILITIES
Our solutions feature advanced adaptive authentication technologies to ensure bold enablement for users and
serious security for the enterprise. We leverage modern analytics technology to capture context, including device
identity, contextual biometrics, user behaviors and transaction details. Our advanced adaptive policy engine uses
this information to allow seamless access to authorized users — or present a challenge when risk parameters or
compliance requirements dictate.
MOBILE INNOVATION
As mobile devices continue to expand in both capability and popularity, they present tremendous opportunities for
you to provide enhanced digital business experiences that are stronger — yet more transparent — for your users.
Create trusted environments for trusted transactions and secure access to websites, VPNs, cloud apps, enterprise
apps, portals and more.
ANALYTICS
Device
Behavior
Transaction
Y
OICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION
BOLD ENABLEMENT
ADAPTIVE
Rules
User
Learning
AUTHENTICATION
Mobile
Biometric
SSO
oves
ation
tered on
• Identity proofing/digital onboarding
• Secure Access
- Workstations, mobile & kiosks
- VPN, Web, Cloud, Enterprise Apps
• Transaction approvals & signatures
• Employees — customers — partners
VIRTUAL APPLIANCE CLOUDON-PREMISES
ANALYTICS
Device
Behavior
Transaction
SERIOUS SECURITY
CHOICE OF DEPLOYMEN
• Rich context and analytics
• Advanced Adaptive that moves
towards invisible authentication
• Modern authentication centered on
mobile and biometrics
ON-PREMISES
ANALYTICS
Device
Behavior
Transaction
SERIOUS SECURITY
CHOICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION
BOLD ENABLEMENT
ADAPTIVE
Rules
User
Learning
AUTHENTICATION
Mobile
Biometric
SSO
ch context and analytics
vanced Adaptive that moves
wards invisible authentication
dern authentication centered on
obile and biometrics
• Identity proofing/digital onboarding
• Secure Access
- Workstations, mobile & kiosks
- VPN, Web, Cloud, Enterprise Apps
• Transaction approvals & signatures
• Employees — customers — partners
VIRTUAL APPLIANCE CLOUDON-PREMISES
OTP Push
Authentication
Transaction
Approvals
Embedded Mobile
Identities
Virtual
Smart Cards
Authentication Solutions
Trusted Identity: The Foundation for Business Transformation
SUPPORT FOR A FULL RANGE OF USE CASES
Entrust Datacard authentication solutions provide secure access to all your cloud and legacy apps — and bold
enablement for all of your users, including employees, contractors, partners, vendors and customers.
APPLICATION INTEGRATIONS
As mobile and cloud emerge, IT departments are no longer securing only critical applications. In order to enable
each department to work securely and effectively, IT is looking to secure everything from networks to applications,
endpoints and transactions. Whether you’re looking to secure SaaS applications, VPN networks or Enterprise Mobility
Management Suites, our depth of tested integrations can meet your needs. And our offering includes a service
gateway that provides secure connectivity back into your enterprise.
Business to Employee
VPN Access
Logical Access
Federation to Cloud Apps
Mobile as the Primary
Computing Platform
Approvals & Signing
Cloud SSO
Physical Access
On-Premises Systems & Apps
Desktop Log-In
BYOD Pre-check
Business to Business
Partner Portals
Federation to Cloud Apps
Approvals & Signing
Transaction Verification
Digital Signatures
Mobile ID Pre-check
Business to Customer
Customer Portals
New Account Creation
Mobile ID Pre-check
Online & Mobile Banking
Financial Card Issuance
Omni-channel Financial Services—
mobile, online, call center, kiosk,
ATM and in-branch
PREBUILT “OUT-OF-BOX”
INTEGRATIONS
RICH APIs FOR
CUSTOM APPLICATION
TOOLKITS TO EMBED
MOBILE IDENTITIES
Entrust Datacard and Entrust are trademarks, registered trademarks and/or service marks of Entrust Datacard Corporation in the United States and/or other countries.
Names and logos on sample cards are fictitious. Any similarity to actual names, trademarks or tradenames is coincidental. ©2016 Entrust Datacard Corporation.
All rights reserved.
About Entrust Datacard
Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they
are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks.
Entrust Datacard offers the trusted identity and secure transaction technologies that make those
experiences reliable and secure. Solutions range from the physical world of financial cards, passports
and ID cards to the digital realm of authentication, certificates and secure communications. With more
than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners,
the company serves customers in 150 countries worldwide.
For more information about Entrust products and services, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com.
Headquarters
Entrust Datacard
1187 Park Place
Shakopee, MN 55379
USA
30146-1-0616
Entrust Datacard Authentication Cloud Service
Enterprise-Grade Authentication With the Ease of Software-as-a-Service (SaaS)
VPN ACCESS CLOUD SSO
USE CASES
SaaS
CUSTOMER
& PARTNER
WEB PORTALS
DESKTOP LOGIN
MOBILE –
THE PRIMARY
COMPUTING
PLATFORM
CRITICAL
ON-PREMISE
SYSTEMS & APPS
ENTERPRISE USE CASES
Differing needs –Single Authentication Platform
Dealing with the realities of your enterprise means that you’ll have varied user communities,
varied use cases and needs that continue to evolve as the business transforms. Entrust
Datacard supports use cases across your enterprise so you can have one authentication
platform to handle diverse requirements.
š VPN Access. Empower remote employees to work securely and efficiently — anytime,
anywhere — with secure access to WiFi, VPNs and other networks.
š Customer & Partner Portals. Give your external users access to the apps, information
and networks you choose. Our solution provides each user with one easy-to-manage
credential for secure access.
š Cloud SSO. Give users access to cloud and legacy apps from mobile devices. Offer
your employees and other authorized users frictionless access while providing strong
protection against breaches.
š Critical On-Premise Systems & Apps. Provide strong authentication and trusted security
for critical resources that sit inside your firewall. Protect against unauthorized access and
breaches.
š Desktop Log-In. When users login to their desktops, they open a door to the corporate
network and its data and applications. Our solution ensures security while providing users
with a frictionless experience.
š Mobile Computing Platform. Our solution works like a virtual smart card that resides
on the mobile device. But there is nothing for the user to carry or insert. The process is
transparent to users and provides secure SSO access to networks and apps.
ESSENTIAL ENABLEMENT & SECURITY
FOR YOUR EVOLVING ENTERPRISE
Your enterprise is undergoing an important transformation. A combination of digital and
physical realities are coming together to form a new generation of prosperity and growth.
Entrust Datacard offers the cloud-based authentication service you need to enable and
secure your evolving enterprise. Our new service lets you choose from a full menu of use
cases, manage a wide range of assurance levels and embrace an inevitable IT transformation
that will give you strong competitive advantages in the markets you serve.
@EntrustDatacard /EntrustSecurity +entrust/EntrustVideo datacard-group
Authentication Solutions
Trusted Identity: The Foundation For Business Transformation
BROADEST RANGE OF AUTHENTICATORS
We support the widest range of authenticators from hardware tokens to mobile push OTPs to align with your needs
and simplify your transition from basic to high-assurance authentication. This breadth of offerings helps you adapt
quickly to new technologies and evolving business processes.
CHOICE OF DEPLOYMENT MODELS
Your enterprise is likely comprised of a mix of on-premises and cloud-based resources. You also have employees
and other authorized users working outside your traditional perimeter who require secure access to your networks.
Entrust Datacard®
authentication solutions offer a choice of deployment models to align with this hybrid reality.
Our three authentication deployment options — on premises, virtual appliance or cloud — allow you to choose the
deployment model that fits your needs while protecting your investment if you want to transition in the future.
ANALYTICS
Device
Behavior
Transaction
SERIOUS SECURITY
CHOICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION
BOLD ENABLEMENT
ADAPTIVE
Rules
User
Learning
AUTHENTICATION
Mobile
Biometric
SSO
• Rich context and analytics
• Advanced Adaptive that moves
towards invisible authentication
• Modern authentication centered on
mobile and biometrics
• Identity proofing/digital onboardin
• Secure Access
- Workstations, mobile & kiosks
- VPN, Web, Cloud, Enterprise Apps
• Transaction approvals & signatures
• Employees — customers — partne
VIRTUAL APPLIANCE CLOUDON-PREMISES
Entrust Datacard and Entrust are trademarks, registered trademarks and/or service marks of Entrust Datacard Corporation in the United States and/or other countries.
Names and logos on sample cards are fictitious. Any similarity to actual names, trademarks or tradenames is coincidental. ©2017 Entrust Datacard Corporation.
All rights reserved.
XXXXXXXXXXXX
Password
Device
Authentication
Mobile Device
OTP Tokens
Grid / eGrid
Transaction
Signing
Smartcards
and USB
Mobile Soft
Token
Transaction
SMS
Digital
IP-Geolocation
Mutual
Authentication
Biometrics
Mobile Smart
Credential
Knowledge
Based
OTP and Certificate-based authentication options
ENTRUST DATACARD
AUTHENTICATION SUITE
EntrustDatacard

Mais conteúdo relacionado

Mais procurados

Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS OverviewChris Kluis
 
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?techrace
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile ConnectUbisecure
 
Company Profile
Company ProfileCompany Profile
Company ProfileITB001
 
Eudata Multichannel Solution for Customer Care and Expert Advisor
Eudata Multichannel Solution for Customer Care and Expert AdvisorEudata Multichannel Solution for Customer Care and Expert Advisor
Eudata Multichannel Solution for Customer Care and Expert AdvisorSandro Parisi
 
Retaam Company Profile 2016
Retaam Company Profile 2016Retaam Company Profile 2016
Retaam Company Profile 2016Khaled Shaikh
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_BrochureOmar Tarish
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM
 
About Misha Infotech
About Misha InfotechAbout Misha Infotech
About Misha InfotechAmit K
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global ProfileSundar Rajan
 
Talon Financial
Talon FinancialTalon Financial
Talon Financialsberrios
 
SBR Information
SBR InformationSBR Information
SBR InformationToni Lewis
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzenThomas Dehler
 
Enterprise Mobility Trends - Ashok's TechGig Webinar
Enterprise Mobility Trends - Ashok's TechGig WebinarEnterprise Mobility Trends - Ashok's TechGig Webinar
Enterprise Mobility Trends - Ashok's TechGig WebinarAshok Karania
 

Mais procurados (19)

Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS Overview
 
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?
IT’S NOT WHAT WE DO, IT’S WHY WE DO IT?
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
CardConnect
CardConnectCardConnect
CardConnect
 
TECON Company Profile
TECON Company ProfileTECON Company Profile
TECON Company Profile
 
Eudata Multichannel Solution for Customer Care and Expert Advisor
Eudata Multichannel Solution for Customer Care and Expert AdvisorEudata Multichannel Solution for Customer Care and Expert Advisor
Eudata Multichannel Solution for Customer Care and Expert Advisor
 
Retaam Company Profile 2016
Retaam Company Profile 2016Retaam Company Profile 2016
Retaam Company Profile 2016
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!
 
About Misha Infotech
About Misha InfotechAbout Misha Infotech
About Misha Infotech
 
SunSmart Global Profile
SunSmart Global ProfileSunSmart Global Profile
SunSmart Global Profile
 
Talon Financial
Talon FinancialTalon Financial
Talon Financial
 
I ty x_platform_jw
I ty x_platform_jwI ty x_platform_jw
I ty x_platform_jw
 
SBR Information
SBR InformationSBR Information
SBR Information
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
 
Portfolio Presentation Ashraf information Technologies 2020
Portfolio Presentation   Ashraf information Technologies  2020 Portfolio Presentation   Ashraf information Technologies  2020
Portfolio Presentation Ashraf information Technologies 2020
 
Enterprise Mobility Trends - Ashok's TechGig Webinar
Enterprise Mobility Trends - Ashok's TechGig WebinarEnterprise Mobility Trends - Ashok's TechGig Webinar
Enterprise Mobility Trends - Ashok's TechGig Webinar
 

Semelhante a Entrust datacard --Authentication solutions overview

Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-OnUbisecure
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small BusinessesInstasafe1
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonCloudFenceTechnologi
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Steven Williams
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 

Semelhante a Entrust datacard --Authentication solutions overview (20)

Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses
 
AWS Partners
AWS PartnersAWS Partners
AWS Partners
 
Microsoft Office 365
Microsoft Office 365 Microsoft Office 365
Microsoft Office 365
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in Gurgaon
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 

Mais de Abhishek Sood

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management Abhishek Sood
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps teamAbhishek Sood
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Abhishek Sood
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9MAbhishek Sood
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to knowAbhishek Sood
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and moreAbhishek Sood
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?Abhishek Sood
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approachAbhishek Sood
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management Abhishek Sood
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructureAbhishek Sood
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformationAbhishek Sood
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industriesAbhishek Sood
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAbhishek Sood
 

Mais de Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 

Último

Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...priyasharma62062
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...Henry Tapper
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator OptionsVince Stanzione
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...priyasharma62062
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...priyasharma62062
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 

Entrust datacard --Authentication solutions overview

  • 1. AUTHENTICATION SOLUTIONS Trusted Identity: The Foundation for Business Transformation AUTHENTICATION FOR EVOLVING DIGITAL BUSINESS You understand the necessity of business transformation — and you’re developing and deploying plans to get there. After all, since 2000, more than 50% of the Fortune 500 companies have either slipped off that list or are gone altogether. The most common reason was failure to “go digital.” A foundational element of success for your digital business plans is trusted identity. More and more of your employees are truly mobile. Your customers and partners expect to be connected by secure and accessible digital ecosystems. Even the processes you use to develop your offerings and bring them to market are undergoing a digital transformation. A key to proving your digital business with bold enablement and serious security is choosing the right authentication solution partner. Entrust Datacard has been a leader in trusted identity for more than 20 years. Today, our authentication solutions are leveraged by growing enterprises that know all business is becoming digital business. BUILD YOUR DIGITAL BUSINESS — BREADTH, DEPTH & FLEXIBILITY The breadth of our portfolio — including on-premises, virtual appliance and cloud-based authentication solutions — allows you to trust one solution partner for all of your identity needs. And our commitment to continuous innovation means we are with you every step of the way, from where you are today to the realization of your ideal digital enterprise. connected 7.6B 75B 2020 BY mobile 24B connected people devices devices
  • 2. Authentication Solutions Trusted Identity: The Foundation for Business Transformation ADVANCED ANALYTICS AND ADAPTIVE AUTHENTICATION CAPABILITIES Our solutions feature advanced adaptive authentication technologies to ensure bold enablement for users and serious security for the enterprise. We leverage modern analytics technology to capture context, including device identity, contextual biometrics, user behaviors and transaction details. Our advanced adaptive policy engine uses this information to allow seamless access to authorized users — or present a challenge when risk parameters or compliance requirements dictate. MOBILE INNOVATION As mobile devices continue to expand in both capability and popularity, they present tremendous opportunities for you to provide enhanced digital business experiences that are stronger — yet more transparent — for your users. Create trusted environments for trusted transactions and secure access to websites, VPNs, cloud apps, enterprise apps, portals and more. ANALYTICS Device Behavior Transaction Y OICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION BOLD ENABLEMENT ADAPTIVE Rules User Learning AUTHENTICATION Mobile Biometric SSO oves ation tered on • Identity proofing/digital onboarding • Secure Access - Workstations, mobile & kiosks - VPN, Web, Cloud, Enterprise Apps • Transaction approvals & signatures • Employees — customers — partners VIRTUAL APPLIANCE CLOUDON-PREMISES ANALYTICS Device Behavior Transaction SERIOUS SECURITY CHOICE OF DEPLOYMEN • Rich context and analytics • Advanced Adaptive that moves towards invisible authentication • Modern authentication centered on mobile and biometrics ON-PREMISES ANALYTICS Device Behavior Transaction SERIOUS SECURITY CHOICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION BOLD ENABLEMENT ADAPTIVE Rules User Learning AUTHENTICATION Mobile Biometric SSO ch context and analytics vanced Adaptive that moves wards invisible authentication dern authentication centered on obile and biometrics • Identity proofing/digital onboarding • Secure Access - Workstations, mobile & kiosks - VPN, Web, Cloud, Enterprise Apps • Transaction approvals & signatures • Employees — customers — partners VIRTUAL APPLIANCE CLOUDON-PREMISES OTP Push Authentication Transaction Approvals Embedded Mobile Identities Virtual Smart Cards
  • 3. Authentication Solutions Trusted Identity: The Foundation for Business Transformation SUPPORT FOR A FULL RANGE OF USE CASES Entrust Datacard authentication solutions provide secure access to all your cloud and legacy apps — and bold enablement for all of your users, including employees, contractors, partners, vendors and customers. APPLICATION INTEGRATIONS As mobile and cloud emerge, IT departments are no longer securing only critical applications. In order to enable each department to work securely and effectively, IT is looking to secure everything from networks to applications, endpoints and transactions. Whether you’re looking to secure SaaS applications, VPN networks or Enterprise Mobility Management Suites, our depth of tested integrations can meet your needs. And our offering includes a service gateway that provides secure connectivity back into your enterprise. Business to Employee VPN Access Logical Access Federation to Cloud Apps Mobile as the Primary Computing Platform Approvals & Signing Cloud SSO Physical Access On-Premises Systems & Apps Desktop Log-In BYOD Pre-check Business to Business Partner Portals Federation to Cloud Apps Approvals & Signing Transaction Verification Digital Signatures Mobile ID Pre-check Business to Customer Customer Portals New Account Creation Mobile ID Pre-check Online & Mobile Banking Financial Card Issuance Omni-channel Financial Services— mobile, online, call center, kiosk, ATM and in-branch PREBUILT “OUT-OF-BOX” INTEGRATIONS RICH APIs FOR CUSTOM APPLICATION TOOLKITS TO EMBED MOBILE IDENTITIES
  • 4. Entrust Datacard and Entrust are trademarks, registered trademarks and/or service marks of Entrust Datacard Corporation in the United States and/or other countries. Names and logos on sample cards are fictitious. Any similarity to actual names, trademarks or tradenames is coincidental. ©2016 Entrust Datacard Corporation. All rights reserved. About Entrust Datacard Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Headquarters Entrust Datacard 1187 Park Place Shakopee, MN 55379 USA 30146-1-0616 Entrust Datacard Authentication Cloud Service Enterprise-Grade Authentication With the Ease of Software-as-a-Service (SaaS) VPN ACCESS CLOUD SSO USE CASES SaaS CUSTOMER & PARTNER WEB PORTALS DESKTOP LOGIN MOBILE – THE PRIMARY COMPUTING PLATFORM CRITICAL ON-PREMISE SYSTEMS & APPS ENTERPRISE USE CASES Differing needs –Single Authentication Platform Dealing with the realities of your enterprise means that you’ll have varied user communities, varied use cases and needs that continue to evolve as the business transforms. Entrust Datacard supports use cases across your enterprise so you can have one authentication platform to handle diverse requirements. š VPN Access. Empower remote employees to work securely and efficiently — anytime, anywhere — with secure access to WiFi, VPNs and other networks. š Customer & Partner Portals. Give your external users access to the apps, information and networks you choose. Our solution provides each user with one easy-to-manage credential for secure access. š Cloud SSO. Give users access to cloud and legacy apps from mobile devices. Offer your employees and other authorized users frictionless access while providing strong protection against breaches. š Critical On-Premise Systems & Apps. Provide strong authentication and trusted security for critical resources that sit inside your firewall. Protect against unauthorized access and breaches. š Desktop Log-In. When users login to their desktops, they open a door to the corporate network and its data and applications. Our solution ensures security while providing users with a frictionless experience. š Mobile Computing Platform. Our solution works like a virtual smart card that resides on the mobile device. But there is nothing for the user to carry or insert. The process is transparent to users and provides secure SSO access to networks and apps. ESSENTIAL ENABLEMENT & SECURITY FOR YOUR EVOLVING ENTERPRISE Your enterprise is undergoing an important transformation. A combination of digital and physical realities are coming together to form a new generation of prosperity and growth. Entrust Datacard offers the cloud-based authentication service you need to enable and secure your evolving enterprise. Our new service lets you choose from a full menu of use cases, manage a wide range of assurance levels and embrace an inevitable IT transformation that will give you strong competitive advantages in the markets you serve. @EntrustDatacard /EntrustSecurity +entrust/EntrustVideo datacard-group Authentication Solutions Trusted Identity: The Foundation For Business Transformation BROADEST RANGE OF AUTHENTICATORS We support the widest range of authenticators from hardware tokens to mobile push OTPs to align with your needs and simplify your transition from basic to high-assurance authentication. This breadth of offerings helps you adapt quickly to new technologies and evolving business processes. CHOICE OF DEPLOYMENT MODELS Your enterprise is likely comprised of a mix of on-premises and cloud-based resources. You also have employees and other authorized users working outside your traditional perimeter who require secure access to your networks. Entrust Datacard® authentication solutions offer a choice of deployment models to align with this hybrid reality. Our three authentication deployment options — on premises, virtual appliance or cloud — allow you to choose the deployment model that fits your needs while protecting your investment if you want to transition in the future. ANALYTICS Device Behavior Transaction SERIOUS SECURITY CHOICE OF DEPLOYMENT — SAME COMPREHENSIVE SOLUTION BOLD ENABLEMENT ADAPTIVE Rules User Learning AUTHENTICATION Mobile Biometric SSO • Rich context and analytics • Advanced Adaptive that moves towards invisible authentication • Modern authentication centered on mobile and biometrics • Identity proofing/digital onboardin • Secure Access - Workstations, mobile & kiosks - VPN, Web, Cloud, Enterprise Apps • Transaction approvals & signatures • Employees — customers — partne VIRTUAL APPLIANCE CLOUDON-PREMISES Entrust Datacard and Entrust are trademarks, registered trademarks and/or service marks of Entrust Datacard Corporation in the United States and/or other countries. Names and logos on sample cards are fictitious. Any similarity to actual names, trademarks or tradenames is coincidental. ©2017 Entrust Datacard Corporation. All rights reserved. XXXXXXXXXXXX Password Device Authentication Mobile Device OTP Tokens Grid / eGrid Transaction Signing Smartcards and USB Mobile Soft Token Transaction SMS Digital IP-Geolocation Mutual Authentication Biometrics Mobile Smart Credential Knowledge Based OTP and Certificate-based authentication options ENTRUST DATACARD AUTHENTICATION SUITE EntrustDatacard