SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Entrust IdentityGuard: Federation Module
Manage & Secure Access to Cloud-Based Services and Networks
via Existing User Credentials
                                                                                            Solution Benefits
Organizations are increasingly moving toward cloud and software-as-a-service (SaaS)         •	 Leverage organizational identities to
applications. In many cases, they are forced to create a new set of identity credentials       access cloud and inter- and intra-network
for end-users and, typically, these identities are based on insecure, outdated                 applications
username and password approaches.                                                           •	 Reduce the number of IDs per user

As organizations move more services to the cloud — such as email, CRM and other             •	 Single sign-on (SSO) across multiple services
applications — the number of user identities grows at an exponential rate.                  •	 Integration with SaaS/cloud services
                                                                                               (e.g., Microsoft 365, Salesforce.com)
This leaves end-users with the burden of managing multiple usernames and                    •	 Standards-based approach simplifies
passwords for each service, not only causing frustration but also hindering security           integration (e.g., SAML and OpenID
effectiveness. This approach introduces many obstacles.                                        identity providers)
                                                                                            •	 Strong second-factor authentication
                                                                                               to cloud-based services
  •	 Forgotten usernames and passwords, a frustrating experience that drives                •	 Widest range of cost-effective
    password reuse, thus reducing overall security                                             authentication methods to meet
  •	 Adhering to many differing password policies required by the SaaS/cloud provider          unique user requirements

  •	 Passwords are a weak form of authentication that have low upfront costs,               •	 Flexible to meet current and future
                                                                                               security priorities
    but a high total cost of ownership (TCO) and inherent security risks
                                                                                            •	 Based on award-winning
                                                                                               Entrust IdentityGuard software
                                                                                               authentication platform
Secure Network Expansion
In addition to cloud access, organizations extend access to their networks with
the goal of increasing productivity and streamlining business. But, in doing so,
organizations may need to implement an entirely new user-access infrastructure.

Unfortunately, this likely introduces another set of usernames and passwords for
end‑users to manage. While the use cases of inter- and intra-company access and cloud
differ slightly, the constant thread is the need to provide consistent and secure access.

Simple username and password authentication is insufficient protection
against unauthorized access to cloud-based services. A strong second factor
of authentication is required to properly authenticate individuals accessing
cloud‑based services to protect from theft or altering of sensitive information.

The type of authenticator used, its strength and total cost may be different
depending on what it is protecting, the usability requirements of the officers and
budgetary constraints.
COMPREHENSIVE FEDERATION OF USER IDENTITIES
An extension to the Entrust IdentityGuard software authentication platform, the Entrust IdentityGuard Federation Module allows
organizations to manage and secure access to cloud-based services by federating existing user credentials.

The solution enables organizations to federate identities                  Organizations may integrate with some of the most popular
to securely access other networks (e.g., partnering                        cloud-based services (e.g., Microsoft 365, Salesforce.com),
organizations), reducing reliance on usernames and                         which allows end-users to have consistent, simple and secure
passwords, as well as improving both security and the                      access to cloud-based services or other organizations.
end‑user experience.



FEDERATION MODULE: HOW IT WORKS
The Entrust IdentityGuard Federation Module enables secure access to a variety of distinct networks — whether they are within the
organization or are external (e.g., cloud services, and/or a partnering organization). Simply, organizations require a secure means
to access information contained within these entities.

Leverage Existing Digital IDs                                              Extend Security Investment
The Federation Module allows users to leverage existing                    Unlike other federation solutions on the market, Entrust’s
corporate IDs to access specific external network segments                 federation module is based on the award-winning Entrust
and cloud-based services — all without having to introduce                 IdentityGuard software authentication platform, which
or issue another set of identity credentials. The solution                 enables organizations to inherit the strong identity offerings
is based on industry-wide standards such as SAML and                       already provided by the platform.
OpenID, allowing organizations the assurance of integration,
compatibility and future extensibility.




                                                                   Cloud



             Physical/Logical Access      Mobile                                        Transaction Signing      User Self-Service


                                                                       SOFTWARE AUTHENTICATION PLATFORM


           Comprehensive Integration   Advanced APIs        Seamless Co-Deployment     Flexible Policy Engine   Authenticator Suite
AWARD-WINNING AUTHENTICATION PLATFORM
Entrust IdentityGuard secures cloud and network access for many of the world’s leading enterprises, governments and financial
institutions. It serves as an organization’s single comprehensive user authentication platform and authenticates identities prior to
accessing sensitive cloud-based services or computer networks.

All Authenticators, One Platform                                                            Evolve to Address New Risks
Entrust IdentityGuard offers a broad range of user authentication                           This approach provides a single point of administration,
methods including physical (e.g., a one‑time‑passcode token                                 regardless of the authentication option or combination
or grid card), mobile- and smartcard-based, or online                                       of options deployed.
(e.g., passwords plus questions and answers).
                                                                                            Organizations are able to evolve and change authentication
Organizations may deploy authentication methods that                                        methods over time as the risks and the operating
are convenient and simple to use, ensure strong user                                        environment change.
authentication of the user, and meet the budgetary
requirements of the organization.




                                                                                   Transaction
                                                                                   Verification        Mobile Device
                                                          Mobile Soft Token                             Certificates
                                                                                                                             Mobile Smart
                                          SMS                                                                                 Credential

                       Device
                                                                                           2
                                                                                                                                              Smartcards
                    Authentication                                                Grid / eGrid                                                 and USB
                                                                 Knowledge
                                                                   Based                              OTP Tokens
                                            2.16.191.253.108

         LOGIN                                  IP-Geolocation                                                           Digital                           Transaction
         Password                                                                                                      Certificates                          Signing

                                  Mutual
                               Authentication                                                                                         Biometrics


                                                  Software Authentication Platform
Entrust’s flagship authentication solution, Entrust IdentityGuard continues to lead the industry as one of the most robust software authentication platforms,
delivering an unmatched breadth of capabilities and flexibility to meet the most demanding security environments.
Evaluating Security Needs
The traditional authentication method — a user providing                                                          Internal Security Evaluation
their username and password — is proven to be ineffective in
preventing unauthorized access. Entrust IdentityGuard allows                                                      •	 How sensitive is the information you are protecting?
organizations to require additional authentication prior to                                                       •	 What is the risk of a breach?
network access.
                                                                                                                  •	 Who will be using the authenticator and what are
All users are not created equal — nor do they need the same                                                          their unique requirements?
access. Entrust provides a range of authentication methods                                                        •	 Do you want authentication to be transparent to
to ensure an organization’s unique requirements are met.                                                             the user or can the user carry a physical device?
The type of authenticators used is based on an evaluation
                                                                                                                  •	 Can you leverage the user’s mobile device?
of the organization and their requirements.
                                                                                                                  •	 Do you want to use the same authenticator for
Once issued, this second factor of authentication will be                                                            physical access?
required (in addition to their username and password) when
a user attempts to access a secure network. This helps strongly
authenticate the identity of the individual and prevent
unauthorized access.



Entrust & You                                                                                                 A trusted provider of identity-based security solutions,
More than ever, Entrust understands your organization’s                                                       Entrust empowers governments, enterprises and financial
security pain points. Whether it’s the protection of information,                                             institutions in more than 5,000 organizations spanning 85
securing online customers, regulatory compliance or large-scale                                               countries. Entrust’s award-winning software authentication
government projects.                                                                                          platforms manage today’s most secure identity credentials,
                                                                                                              addressing customer pain points for cloud and mobile security,
Entrust provides identity-based security solutions that are not                                               physical and logical access, citizen eID initiatives, certificate
only proven in real-world environments, but cost-effective in                                                 management and SSL.
today’s uncertain economic climate.
                                                                                                              For more information on Entrust’s comprehensive portfolio of
                                                                                                              identity-based security solutions, contact the representative in
                                                                                                              your area at 888-690-2424 or visit entrust.com/federation.




About Entrust
A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning
85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud
and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services,
call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service
names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their
respective owners. © 2012 Entrust. All rights reserved.
                                                                                                                                                                                                    24640/12-12

Mais conteúdo relacionado

Mais de Entrust Datacard

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Mais de Entrust Datacard (7)

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Entrust IdentityGuard Federation

  • 1. Entrust IdentityGuard: Federation Module Manage & Secure Access to Cloud-Based Services and Networks via Existing User Credentials Solution Benefits Organizations are increasingly moving toward cloud and software-as-a-service (SaaS) • Leverage organizational identities to applications. In many cases, they are forced to create a new set of identity credentials access cloud and inter- and intra-network for end-users and, typically, these identities are based on insecure, outdated applications username and password approaches. • Reduce the number of IDs per user As organizations move more services to the cloud — such as email, CRM and other • Single sign-on (SSO) across multiple services applications — the number of user identities grows at an exponential rate. • Integration with SaaS/cloud services (e.g., Microsoft 365, Salesforce.com) This leaves end-users with the burden of managing multiple usernames and • Standards-based approach simplifies passwords for each service, not only causing frustration but also hindering security integration (e.g., SAML and OpenID effectiveness. This approach introduces many obstacles. identity providers) • Strong second-factor authentication to cloud-based services • Forgotten usernames and passwords, a frustrating experience that drives • Widest range of cost-effective password reuse, thus reducing overall security authentication methods to meet • Adhering to many differing password policies required by the SaaS/cloud provider unique user requirements • Passwords are a weak form of authentication that have low upfront costs, • Flexible to meet current and future security priorities but a high total cost of ownership (TCO) and inherent security risks • Based on award-winning Entrust IdentityGuard software authentication platform Secure Network Expansion In addition to cloud access, organizations extend access to their networks with the goal of increasing productivity and streamlining business. But, in doing so, organizations may need to implement an entirely new user-access infrastructure. Unfortunately, this likely introduces another set of usernames and passwords for end‑users to manage. While the use cases of inter- and intra-company access and cloud differ slightly, the constant thread is the need to provide consistent and secure access. Simple username and password authentication is insufficient protection against unauthorized access to cloud-based services. A strong second factor of authentication is required to properly authenticate individuals accessing cloud‑based services to protect from theft or altering of sensitive information. The type of authenticator used, its strength and total cost may be different depending on what it is protecting, the usability requirements of the officers and budgetary constraints.
  • 2. COMPREHENSIVE FEDERATION OF USER IDENTITIES An extension to the Entrust IdentityGuard software authentication platform, the Entrust IdentityGuard Federation Module allows organizations to manage and secure access to cloud-based services by federating existing user credentials. The solution enables organizations to federate identities Organizations may integrate with some of the most popular to securely access other networks (e.g., partnering cloud-based services (e.g., Microsoft 365, Salesforce.com), organizations), reducing reliance on usernames and which allows end-users to have consistent, simple and secure passwords, as well as improving both security and the access to cloud-based services or other organizations. end‑user experience. FEDERATION MODULE: HOW IT WORKS The Entrust IdentityGuard Federation Module enables secure access to a variety of distinct networks — whether they are within the organization or are external (e.g., cloud services, and/or a partnering organization). Simply, organizations require a secure means to access information contained within these entities. Leverage Existing Digital IDs Extend Security Investment The Federation Module allows users to leverage existing Unlike other federation solutions on the market, Entrust’s corporate IDs to access specific external network segments federation module is based on the award-winning Entrust and cloud-based services — all without having to introduce IdentityGuard software authentication platform, which or issue another set of identity credentials. The solution enables organizations to inherit the strong identity offerings is based on industry-wide standards such as SAML and already provided by the platform. OpenID, allowing organizations the assurance of integration, compatibility and future extensibility. Cloud Physical/Logical Access Mobile Transaction Signing User Self-Service SOFTWARE AUTHENTICATION PLATFORM Comprehensive Integration Advanced APIs Seamless Co-Deployment Flexible Policy Engine Authenticator Suite
  • 3. AWARD-WINNING AUTHENTICATION PLATFORM Entrust IdentityGuard secures cloud and network access for many of the world’s leading enterprises, governments and financial institutions. It serves as an organization’s single comprehensive user authentication platform and authenticates identities prior to accessing sensitive cloud-based services or computer networks. All Authenticators, One Platform Evolve to Address New Risks Entrust IdentityGuard offers a broad range of user authentication This approach provides a single point of administration, methods including physical (e.g., a one‑time‑passcode token regardless of the authentication option or combination or grid card), mobile- and smartcard-based, or online of options deployed. (e.g., passwords plus questions and answers). Organizations are able to evolve and change authentication Organizations may deploy authentication methods that methods over time as the risks and the operating are convenient and simple to use, ensure strong user environment change. authentication of the user, and meet the budgetary requirements of the organization. Transaction Verification Mobile Device Mobile Soft Token Certificates Mobile Smart SMS Credential Device 2 Smartcards Authentication Grid / eGrid and USB Knowledge Based OTP Tokens 2.16.191.253.108 LOGIN IP-Geolocation Digital Transaction Password Certificates Signing Mutual Authentication Biometrics Software Authentication Platform Entrust’s flagship authentication solution, Entrust IdentityGuard continues to lead the industry as one of the most robust software authentication platforms, delivering an unmatched breadth of capabilities and flexibility to meet the most demanding security environments.
  • 4. Evaluating Security Needs The traditional authentication method — a user providing Internal Security Evaluation their username and password — is proven to be ineffective in preventing unauthorized access. Entrust IdentityGuard allows • How sensitive is the information you are protecting? organizations to require additional authentication prior to • What is the risk of a breach? network access. • Who will be using the authenticator and what are All users are not created equal — nor do they need the same their unique requirements? access. Entrust provides a range of authentication methods • Do you want authentication to be transparent to to ensure an organization’s unique requirements are met. the user or can the user carry a physical device? The type of authenticators used is based on an evaluation • Can you leverage the user’s mobile device? of the organization and their requirements. • Do you want to use the same authenticator for Once issued, this second factor of authentication will be physical access? required (in addition to their username and password) when a user attempts to access a secure network. This helps strongly authenticate the identity of the individual and prevent unauthorized access. Entrust & You A trusted provider of identity-based security solutions, More than ever, Entrust understands your organization’s Entrust empowers governments, enterprises and financial security pain points. Whether it’s the protection of information, institutions in more than 5,000 organizations spanning 85 securing online customers, regulatory compliance or large-scale countries. Entrust’s award-winning software authentication government projects. platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, Entrust provides identity-based security solutions that are not physical and logical access, citizen eID initiatives, certificate only proven in real-world environments, but cost-effective in management and SSL. today’s uncertain economic climate. For more information on Entrust’s comprehensive portfolio of identity-based security solutions, contact the representative in your area at 888-690-2424 or visit entrust.com/federation. About Entrust A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © 2012 Entrust. All rights reserved. 24640/12-12