SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Entrust IdentityGuard Mobile
Mobile Solutions for Greater Authentication Security                                  Product Benefits
As mobile devices continue to expand in capability and popularity, they present       • Enables strong mobile authentication
                                                                                        with out-of-band transaction
tremendous opportunities for consumers and enterprises alike. This shift to more        confirmation
mobile-centric environments spans consumer-based activities like mobile banking       • Leverages mobile devices to boost
or smartphone transactions, as well as more enterprise-specific tasks such as email     authentication strength without
communication, secure VPN, and physical, logical and mobile access.                     inconvenience
                                                                                      • Provides soft token authentication for
Financial Institutions Fight Fraud                                                      customer or enterprise environments
While there are many safeguards deployed inside financial institutions today,         • Transforms today’s popular smartphones
                                                                                        into mobile credentials
criminals are increasingly turning to highly effective social engineering tactics,
combined with stealthy malware, to illegally obtain consumer identities.              • Includes standards-based (OATH)
                                                                                        authentication and signature
To combat these attacks, Entrust IdentityGuard Mobile provides three tools
                                                                                      • Support for leading mobile platforms
that help organizations stop many types of online and mobile fraud threats.             including Apple iOS, RIM BlackBerry,
                                                                                        Google Android and Microsoft Windows
• Mobile One-Time-Passcode Tokens                                                       Mobile (6.0-6.5)
  Entrust enables organizations to transform smartphones into convenient, secure      • Customizable to include organization-
  one-time-passcode (OTP) tokens, leveraging devices that are widely deployed,          specific branding for increased user
  to provide convenient security for online banking. Organizations can also brand       acceptance
  these soft tokens for better customer or employee recognition. And this is a
  proven method that helps defend against today’s advanced malware, like
  man-in-the-browser attacks.

• Out-of-Band Verification
  Entrust’s mobile application provides out-of-band notification of transaction
  details as part of the authentication process, and enables users to confirm the
  legitimacy of transactions. Entrust IdentityGuard also includes the ability to
  store and refer to transaction history.

• Transparent Strong Authentication
  Entrust's easy-to-use software development kit (SDK) helps organizations embed
  transparent strong authentication right into their own mobile application. This
  provides transparent security for consumers using mobile banking, while enabling
  organizations to enhance security for the online channel.

  And embedding OTP technology in a mobile device is more cost-effective than
  purchasing, issuing and deploying hardware tokens because it leverages devices
  that are already widely deployed — increasing user acceptance.
Mobile Devices Improve Enterprise Security                                 Through the Entrust IdentityGuard platform, organizations
Much like the approach to securing mobile-banking                          may even transform end-user smartphones into true
customers, affordable solutions are available to secure                     mobile credentials. Further convenience is realized for
mobile devices that interact or gain access to corporate                   physical and logical access with the support of the latest
environments. But enterprises face a different set of                       industry standards including near-field communication
challenges with mobile devices co-existing within secure                   (NFC) and Bluetooth.
corporate infrastructures.
                                                                           Stronger Authentication via Mobile Devices
The use of mobile soft tokens — primarily to enable                        Entrust provides mobile security capabilities via distinct
strong authentication to enterprise networks, applications                 solution areas — mobile authentication, transaction
and resources — dramatically improves enterprise security.                 verification, mobile smart credentials, and transparent
Not only are they simple to use and deploy, they increase                  authentication technology with an advanced software
end-user adoption and promote cost-savings by removing                     development kit (SDK).
the need to issue expensive hardware tokens.
                                                                           In addition to enabling strong authentication with a
                                                                           software-based OTP token, Entrust IdentityGuard also
                                                                           strongly authenticates online transactions, taking into
                                                                           consideration the details of that specific transaction.

Entrust IdentityGuard Mobile

                                                      User logs in to the online application. This will often
                        Login
  1                                                   include transparent forms of authentication beyond
                                                      username and password (e.g., device authentication).




                       Transfer                       User decides to undertake a more risky transaction;
  2                    $32,150                        a large money transfer or adding a new bill payee,
                                                      for example.




                                                      The bank displays a Web confirmation screen to
  3                                                   the user and also sends the transaction information
                                                      directly to Entrust IdentityGuard Mobile.

                                                      Entrust IdentityGuard Mobile automatically alerts
                                                      the user that they have a waiting transaction.
                                                      The user compares the details of the transaction and,
                                                      if correct, types the generated confirmation code into
                                                      the Web application to complete the action.

Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
Advantages                                                       Portable
Simple Soft Tokens                                               Use the most popular mobile platforms to boost
Transform smartphones into convenient, secure                    authentication strength by not requiring the user to
one-time-passcode (OTP) tokens. This approach has a high         carry an extra hardware device or have access to a
user-adoption rate and can include organizations-specific        specific computer.
branding for better customer or employee recognition.
                                                                 Flexible
Mobile Smart Credentials                                         Supports the use of both simple time-based OTP as well
Entrust adds smart credential capabilities to mobile devices     as out-of-band transaction signatures. Also supports
for physical and logical access, but also provides smartcard-    multiple identities within the same application, enabling
based security for desktops and laptops without native           organizations to fully leverage the deployed application
smartcard readers.                                               (e.g., a banking ID as well as a corporate remote access ID).

Beat MITB                                                        Broad Platform Support
One of the only mobile authentication solution on                Supports the leading mobile platforms on the
the market today that helps defeat advanced malware,             market today, including Apple iOS, RIM BlackBerry,
including man-in-the-browser attacks. Key to interoperability,   Google Android and Microsoft Windows Mobile (6.0-6.5).
it leverages proven time-based, OATH-compliant OTP
authentication and out-of-band transaction verification          Standards-Compliant
on leading mobile devices.                                       Uses the OATH standard for time-based, one-time-
                                                                 passcode and transaction signature generation.
Easy to Use
Enables out-of-band transaction verification,                    Customizable
OATH-compliant signatures and even a method to                   Includes the ability to add organization-specific branding
immediately report suspicions account behavior.                  to each identity, improving usability and reinforcing brand
The end-user isn't forced to enter any data within the           image.
smartphone application, only a straightforward Web
confirmation code to complete the transaction online.            For Developers
                                                                 Entrust's easy-to-use SDK helps organizations embed
Enterprise Mobility                                              transparent and strong authentication right into their
Entrust provides the only authentication platform that fully     own mobile applications.
enables today’s leading mobile platforms for real-world
business use. Entrust’s mobile capabilities make it easy for
end-users to enroll their mobile devices for device
certificate issuance. And advanced mobile smart
credentials can be used with Bluetooth and NFC
technology for even greater convenience.

Easy Integration
Entrust’s open API architecture allows for tight integration
with today's leading mobile device management (MDM),
identity access management (IAM) and public key
infrastructure (PKI) vendors. This enables Entrust
IdentityGuard to work with new and existing enterprise
implementations, plus adds the ability to integrate in-
house or managed service-based digital certificates.
Entrust & You                                                                                      Company Facts
More than ever, Entrust understands your organization’s                                            Website: www.entrust.com
security pain points. Whether it’s the protection of                                               Employees: 359
information, securing online customers, regulatory                                                 Customers: 5,000
compliance or large-scale government projects, Entrust                                             Offices: 10 globally
provides identity-based security solutions that are not
only proven in real-world environments, but cost-effective                                          Headquarters
in today’s uncertain economic climate.                                                             One Lincoln Centre
                                                                                                   5400 LBJ Freeway, Suite 1340
The smart choice for properly securing digital identities                                          Dallas, Texas 75240 USA
and information, Entrust solutions represent the right
balance between affordability, expertise and service. For                                           Sales
more information on Entrust IdentityGuard Mobile, contact                                          North America: 1-888-690-2424
the Entrust representative in your area at 888-690-2424 or                                         EMEA: +44 (0) 118 953 3000
visit entrust.com/mobile.                                                                          Email: entrust@entrust.com




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations
spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain
points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust
products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product
names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks
or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved.
                                                                                                                                                                                    24003/4-12

Weitere ähnliche Inhalte

Was ist angesagt?

Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
OKsystem
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 

Was ist angesagt? (17)

Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
test
testtest
test
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David PollingtonCIS 2015-Putting Control Back in the Users’ Hands- David Pollington
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Currency
CurrencyCurrency
Currency
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 

Andere mochten auch

Andere mochten auch (6)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 

Ähnlich wie Entrust IdentityGuard Mobile

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
pjpallen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
kate_holden
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.
 

Ähnlich wie Entrust IdentityGuard Mobile (20)

Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
status
statusstatus
status
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Nexmo Verify SDK
Nexmo Verify SDKNexmo Verify SDK
Nexmo Verify SDK
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Entrust IdentityGuard Mobile

  • 1. Entrust IdentityGuard Mobile Mobile Solutions for Greater Authentication Security Product Benefits As mobile devices continue to expand in capability and popularity, they present • Enables strong mobile authentication with out-of-band transaction tremendous opportunities for consumers and enterprises alike. This shift to more confirmation mobile-centric environments spans consumer-based activities like mobile banking • Leverages mobile devices to boost or smartphone transactions, as well as more enterprise-specific tasks such as email authentication strength without communication, secure VPN, and physical, logical and mobile access. inconvenience • Provides soft token authentication for Financial Institutions Fight Fraud customer or enterprise environments While there are many safeguards deployed inside financial institutions today, • Transforms today’s popular smartphones into mobile credentials criminals are increasingly turning to highly effective social engineering tactics, combined with stealthy malware, to illegally obtain consumer identities. • Includes standards-based (OATH) authentication and signature To combat these attacks, Entrust IdentityGuard Mobile provides three tools • Support for leading mobile platforms that help organizations stop many types of online and mobile fraud threats. including Apple iOS, RIM BlackBerry, Google Android and Microsoft Windows • Mobile One-Time-Passcode Tokens Mobile (6.0-6.5) Entrust enables organizations to transform smartphones into convenient, secure • Customizable to include organization- one-time-passcode (OTP) tokens, leveraging devices that are widely deployed, specific branding for increased user to provide convenient security for online banking. Organizations can also brand acceptance these soft tokens for better customer or employee recognition. And this is a proven method that helps defend against today’s advanced malware, like man-in-the-browser attacks. • Out-of-Band Verification Entrust’s mobile application provides out-of-band notification of transaction details as part of the authentication process, and enables users to confirm the legitimacy of transactions. Entrust IdentityGuard also includes the ability to store and refer to transaction history. • Transparent Strong Authentication Entrust's easy-to-use software development kit (SDK) helps organizations embed transparent strong authentication right into their own mobile application. This provides transparent security for consumers using mobile banking, while enabling organizations to enhance security for the online channel. And embedding OTP technology in a mobile device is more cost-effective than purchasing, issuing and deploying hardware tokens because it leverages devices that are already widely deployed — increasing user acceptance.
  • 2. Mobile Devices Improve Enterprise Security Through the Entrust IdentityGuard platform, organizations Much like the approach to securing mobile-banking may even transform end-user smartphones into true customers, affordable solutions are available to secure mobile credentials. Further convenience is realized for mobile devices that interact or gain access to corporate physical and logical access with the support of the latest environments. But enterprises face a different set of industry standards including near-field communication challenges with mobile devices co-existing within secure (NFC) and Bluetooth. corporate infrastructures. Stronger Authentication via Mobile Devices The use of mobile soft tokens — primarily to enable Entrust provides mobile security capabilities via distinct strong authentication to enterprise networks, applications solution areas — mobile authentication, transaction and resources — dramatically improves enterprise security. verification, mobile smart credentials, and transparent Not only are they simple to use and deploy, they increase authentication technology with an advanced software end-user adoption and promote cost-savings by removing development kit (SDK). the need to issue expensive hardware tokens. In addition to enabling strong authentication with a software-based OTP token, Entrust IdentityGuard also strongly authenticates online transactions, taking into consideration the details of that specific transaction. Entrust IdentityGuard Mobile User logs in to the online application. This will often Login 1 include transparent forms of authentication beyond username and password (e.g., device authentication). Transfer User decides to undertake a more risky transaction; 2 $32,150 a large money transfer or adding a new bill payee, for example. The bank displays a Web confirmation screen to 3 the user and also sends the transaction information directly to Entrust IdentityGuard Mobile. Entrust IdentityGuard Mobile automatically alerts the user that they have a waiting transaction. The user compares the details of the transaction and, if correct, types the generated confirmation code into the Web application to complete the action. Figure 1: A common example of how Entrust IdentityGuard helps authenticate and verify a Web-based transaction via a mobile device.
  • 3. Advantages Portable Simple Soft Tokens Use the most popular mobile platforms to boost Transform smartphones into convenient, secure authentication strength by not requiring the user to one-time-passcode (OTP) tokens. This approach has a high carry an extra hardware device or have access to a user-adoption rate and can include organizations-specific specific computer. branding for better customer or employee recognition. Flexible Mobile Smart Credentials Supports the use of both simple time-based OTP as well Entrust adds smart credential capabilities to mobile devices as out-of-band transaction signatures. Also supports for physical and logical access, but also provides smartcard- multiple identities within the same application, enabling based security for desktops and laptops without native organizations to fully leverage the deployed application smartcard readers. (e.g., a banking ID as well as a corporate remote access ID). Beat MITB Broad Platform Support One of the only mobile authentication solution on Supports the leading mobile platforms on the the market today that helps defeat advanced malware, market today, including Apple iOS, RIM BlackBerry, including man-in-the-browser attacks. Key to interoperability, Google Android and Microsoft Windows Mobile (6.0-6.5). it leverages proven time-based, OATH-compliant OTP authentication and out-of-band transaction verification Standards-Compliant on leading mobile devices. Uses the OATH standard for time-based, one-time- passcode and transaction signature generation. Easy to Use Enables out-of-band transaction verification, Customizable OATH-compliant signatures and even a method to Includes the ability to add organization-specific branding immediately report suspicions account behavior. to each identity, improving usability and reinforcing brand The end-user isn't forced to enter any data within the image. smartphone application, only a straightforward Web confirmation code to complete the transaction online. For Developers Entrust's easy-to-use SDK helps organizations embed Enterprise Mobility transparent and strong authentication right into their Entrust provides the only authentication platform that fully own mobile applications. enables today’s leading mobile platforms for real-world business use. Entrust’s mobile capabilities make it easy for end-users to enroll their mobile devices for device certificate issuance. And advanced mobile smart credentials can be used with Bluetooth and NFC technology for even greater convenience. Easy Integration Entrust’s open API architecture allows for tight integration with today's leading mobile device management (MDM), identity access management (IAM) and public key infrastructure (PKI) vendors. This enables Entrust IdentityGuard to work with new and existing enterprise implementations, plus adds the ability to integrate in- house or managed service-based digital certificates.
  • 4. Entrust & You Company Facts More than ever, Entrust understands your organization’s Website: www.entrust.com security pain points. Whether it’s the protection of Employees: 359 information, securing online customers, regulatory Customers: 5,000 compliance or large-scale government projects, Entrust Offices: 10 globally provides identity-based security solutions that are not only proven in real-world environments, but cost-effective Headquarters in today’s uncertain economic climate. One Lincoln Centre 5400 LBJ Freeway, Suite 1340 The smart choice for properly securing digital identities Dallas, Texas 75240 USA and information, Entrust solutions represent the right balance between affordability, expertise and service. For Sales more information on Entrust IdentityGuard Mobile, contact North America: 1-888-690-2424 the Entrust representative in your area at 888-690-2424 or EMEA: +44 (0) 118 953 3000 visit entrust.com/mobile. Email: entrust@entrust.com About Entrust A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved. 24003/4-12