Entrust Physical & Logical Access Solutions

Entrust Datacard
Entrust DatacardEntrust Datacard

Entrust IdentityGuard provides a new standard for physical and logical access control for effective enterprise authentication. This integrated platform approach simplifies the issuance and management of smartcards and certificates, leveraging industry standards such as PIV, all from a single trusted vendor.

Physical & Logical Access Solutions
Platform Approach to Proven Security Convergence                                             Solution Benefits
As approaches for physical and logical access increasingly draw on similar technologies,     • Enables convergence of security for
                                                                                               facilities, remote users, desktops
CIOs seek efficient methods to consolidate these two environments to save money                  and applications
and enhance security.                                                                        • Improves efficiency by using a single
                                                                                               strong authentication platform for
With the evolution of smartcard technology, enterprises can integrate two security             enrollment, issuance and management
environments — physical and logical access — to provide consolidated management,             • Transforms mobile devices into
improved ROI and a total security view. Organizations can also deploy a single strong          enterprise-grade smart credential for
authentication platform to facilitate enrollment, issuance and management, providing           physical and/or logical access
further efficiencies.                                                                          • Tailored for enterprise and government
                                                                                               environments

Access Convergence                                                                           • Leverages Bluetooth and NFC
                                                                                               technology on mobile devices for greater
An individual maliciously obtaining sensitive information by circumventing an online           access convenience
access point or a thief walking into an enterprise and taking laptops illustrate the same    • Platform approach provides versatility
alarming issue — a major lapse in enterprise security. And regardless of the means used        as access requirements change and
to infiltrate an organization, the damage can be significant.                                  business drivers evolve
                                                                                             • Provides single platform to issue and
Traditionally, physical and logical access solutions have been the responsibility of two       manage certificates for smartcards
distinct organizations within a company. And each are often managed by two separate          • Powered by award-winning Entrust
                                                                                               IdentityGuard and Entrust Authority
administrators and systems.
                                                                                               PKI technology

Multipurpose Credentials
Securing multiple access points — wireless, VPN, desktops and facilities, for example —
by relying on separate, often incompatible solutions is expensive, inconvenient for
end-users and difficult for administrators to manage. And legacy solutions are typically
tied to different suppliers, vendors or contractors.

But advances in smartcard technology have made the convergence of physical access
and logical access affordable and simple to deploy.

Platform Approach
Comprehensive physical and logical access is secured by the use of digital certificates,
public key infrastructure (PKI) and a proven strong authentication platform.

Entrust is distinct in being able to bring together all of the elements necessary for
physical and logical access solutions — on a single software platform — and provide
the PKI to issue and manage digital certificates that are deployed to smartcards, mobile
devices or USBs and distributed to end-users.

And as a U.S. Federal government-approved provider of PIV and PIV-I credentials,
Entrust is an expert in the Personal Identity Verification (PIV) standards that industries
and enterprises are adopting to govern their authentication strategies.
PHYSICAL Government                       Enterprise           Interior Access/Levels
                                                                 Entrust
                                                              IdentityGuard                      Partners | Employees | Customers | Suppliers | Remote Employees
                                                              Authenticator
                                                                                             LOGICAL                 Laptops           Mobile Devices             Networks

                     FOR PHYSICAL AND
                      LOGICAL ACCESS


Figure 1: Entrust IdentityGuard leverages smartcards, mobile devices, tokens, digital certificates, biometrics and more to help realize true physical and
logical access convergence in any environment.



Versatile Authentication Platform                                                                  Entrust’s open API architecture allows for tight
By leveraging a software-based platform approach,                                                  integration with today's leading mobile device
organizations can consolidate all authentication processes                                         management (MDM), identity access management (IAM)
with a single, proven solution — Entrust IdentityGuard.                                            and public key infrastructure (PKI) vendors. This enables
                                                                                                   Entrust IdentityGuard to work with new and existing
Whether it’s a smartcard or mobile smart credential for                                            enterprise implementations, plus adds the ability to
physical/logical access, or a unique grid card for strong                                          integrate in-house or managed service-based digital
authentication to a VPN, Entrust IdentityGuard is one of the                                       certificates.
most versatile authentication platforms available. It allows
organizations to deploy the right authenticator to                                                 More Information
different user groups based on the amount of associated                                             For more information on Entrust solutions for physical and
risk, access requirements, unique user needs and cost.                                             logical access, contact the Entrust representative in your
                                                                                                   area at 888.690.2424 or visit entrust.com/physical-logical.




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers enterprises, governments, financial institutions, citizens and websites in more than
4,000 organizations spanning 60 countries. Entrust’s customer-centric focus is the foundation to delivering organizations an unmatched level of security,
trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424,
email entrust@entrust.com or visit www.entrust.com. Let’s talk.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product
names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks
or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved.
                                                                                                                                                                                    24268/2-12

Recomendados

Entrust Enterprise Authentication von
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
735 views4 Folien
Enterprise Mobile Security for PeopleSoft von
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
522 views12 Folien
Intel IT's Identity and Access Management Journey von
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
4.7K views11 Folien
Entrust IdentityGuard Mobile von
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
1.3K views4 Folien
SmartCard Forum 2011 - Evolution of authentication market von
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
880 views28 Folien
Truzzt whitepaper a4_einzel_20200311 von
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311h-bauer2014
78 views15 Folien

Más contenido relacionado

Was ist angesagt?

Hitachi ID Password Manager von
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Systems, Inc.
31 views2 Folien
Access management von
Access managementAccess management
Access managementVenkatesh Jambulingam
162 views14 Folien
Entrust Mobile Security Solutions von
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
1.3K views6 Folien
Sms passcode von
Sms passcodeSms passcode
Sms passcodeTechMeetups
654 views15 Folien
Protecting Payment Card Data Wp091010 von
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
212 views4 Folien
5 reasons your iam solution will fail von
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
1.6K views27 Folien

Was ist angesagt?(19)

Protecting Payment Card Data Wp091010 von Erik Ginalick
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
Erik Ginalick212 views
5 reasons your iam solution will fail von IBM Security
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
IBM Security1.6K views
Byod+ +bring+your+own+device von J
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J 405 views
Biometric Trends for 2017 Webinar von Veridium
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium2.6K views
Sxsw ppt voice-1 von Dan Miller
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
Dan Miller774 views
Identity as a Service: a missing gap for moving enterprise applications in In... von Hoang Tri Vo
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
Hoang Tri Vo579 views
Identity Insights: Social, Local and Mobile Identity von Jon Bultmeyer
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
Jon Bultmeyer782 views
Pg 2 fa_tech_brief von Hai Nguyen
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen594 views
Biometrics and authentication webinar v3 von DigitalPersona
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
DigitalPersona731 views
IntraLinks Company Overview von tillbrennan
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
tillbrennan238 views
Overview of Identity and Access Management Product Line von Novell
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell2.5K views
Auditing in the Cloud von tcarrucan
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan638 views

Destacado

Updating Security Operations For The Cloud von
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The CloudMark Nunnikhoven
6.3K views36 Folien
User authentication trends von
User authentication   trendsUser authentication   trends
User authentication trendsZuraiq K K
363 views39 Folien
Access control3 von
Access control3Access control3
Access control3Awhydot
1.5K views55 Folien
A case for identities - Etisalat, George Held at TADSummit von
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
1.6K views13 Folien
Strong Authentication - Open Source von
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
790 views53 Folien
CIS14: Physical and Logical Access Control Convergence von
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCloudIDSummit
2.2K views22 Folien

Destacado(8)

Updating Security Operations For The Cloud von Mark Nunnikhoven
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
Mark Nunnikhoven6.3K views
User authentication trends von Zuraiq K K
User authentication   trendsUser authentication   trends
User authentication trends
Zuraiq K K363 views
Access control3 von Awhydot
Access control3Access control3
Access control3
Awhydot1.5K views
A case for identities - Etisalat, George Held at TADSummit von Alan Quayle
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
Alan Quayle1.6K views
Strong Authentication - Open Source von Donald Malloy
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
Donald Malloy790 views
CIS14: Physical and Logical Access Control Convergence von CloudIDSummit
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
CloudIDSummit2.2K views
Palm vein technology.pptx von schetan202
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
schetan2028.4K views

Similar a Entrust Physical & Logical Access Solutions

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat... von
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
553 views5 Folien
#MFSummit2016 Secure: Mind the gap strengthening the information security model von
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
799 views28 Folien
Entrust datacard --Authentication solutions overview von
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
94 views4 Folien
Entrust Solutions Portfolio von
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
904 views6 Folien
Frost Entrust Datacard-award-write-up-final von
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
121 views12 Folien
4192 sslvpn sb_0412 von
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
287 views8 Folien

Similar a Entrust Physical & Logical Access Solutions(20)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat... von Entrust Datacard
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard553 views
#MFSummit2016 Secure: Mind the gap strengthening the information security model von Micro Focus
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus 799 views
Entrust datacard --Authentication solutions overview von Abhishek Sood
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood94 views
Frost Entrust Datacard-award-write-up-final von Wendy Murphy
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy121 views
4192 sslvpn sb_0412 von Hai Nguyen
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen287 views
Meeting Mobile and BYOD Security Challenges von Symantec
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
Symantec2.3K views
2FA Advanced Authentication for Public Safety von 2FA, Inc.
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.355 views
Public Key Infrastructure (PKI) von Valerie Mejia
Public Key Infrastructure (PKI)Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI)
Valerie Mejia20 views
Authentication_Best_Practices_WP(EN)_web von SafeNet
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet747 views
Access management von kmehul
Access managementAccess management
Access management
kmehul26 views
Construction Project Collaboration 030210 von Alasdair Kilgour
Construction Project Collaboration 030210Construction Project Collaboration 030210
Construction Project Collaboration 030210
Alasdair Kilgour201 views
Hexnode Identity and Access Management solution von Hexnode
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
Hexnode25 views
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined... von Block Armour
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour27 views

Más de Entrust Datacard

INFOGRAPHIC: Switch to SHA-2 SSL Certificates von
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesEntrust Datacard
1.4K views1 Folie
Switch to SHA-2 SSL - A Step-by-Step Migration Guide von
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
5.1K views18 Folien
INFOGRAPHIC: Securing the Internet of Things von
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsEntrust Datacard
1.1K views1 Folie
Defeating Man-in-the-Browser Malware von
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
869 views18 Folien
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC) von
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
1.5K views23 Folien
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? von
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? Entrust Datacard
844 views1 Folie

Más de Entrust Datacard(9)

INFOGRAPHIC: Switch to SHA-2 SSL Certificates von Entrust Datacard
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
Entrust Datacard1.4K views
Switch to SHA-2 SSL - A Step-by-Step Migration Guide von Entrust Datacard
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Entrust Datacard5.1K views
INFOGRAPHIC: Securing the Internet of Things von Entrust Datacard
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of Things
Entrust Datacard1.1K views
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC) von Entrust Datacard
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Entrust Datacard1.5K views
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? von Entrust Datacard
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?
Entrust Datacard844 views
Advanced Solutions for Critical Infrastructure Protection von Entrust Datacard
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
Entrust Datacard567 views
Easing the Pains of Certificate Management von Entrust Datacard
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
Entrust Datacard593 views

Último

Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
74 views17 Folien
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
128 views20 Folien
MVP and prioritization.pdf von
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 Folien
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
134 views54 Folien
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
97 views28 Folien
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
178 views15 Folien

Último(20)

Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue128 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue134 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ von ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue86 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue52 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
NTGapps NTG LowCode Platform von Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely76 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10110 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue von ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue147 views

Entrust Physical & Logical Access Solutions

  • 1. Physical & Logical Access Solutions Platform Approach to Proven Security Convergence Solution Benefits As approaches for physical and logical access increasingly draw on similar technologies, • Enables convergence of security for facilities, remote users, desktops CIOs seek efficient methods to consolidate these two environments to save money and applications and enhance security. • Improves efficiency by using a single strong authentication platform for With the evolution of smartcard technology, enterprises can integrate two security enrollment, issuance and management environments — physical and logical access — to provide consolidated management, • Transforms mobile devices into improved ROI and a total security view. Organizations can also deploy a single strong enterprise-grade smart credential for authentication platform to facilitate enrollment, issuance and management, providing physical and/or logical access further efficiencies. • Tailored for enterprise and government environments Access Convergence • Leverages Bluetooth and NFC technology on mobile devices for greater An individual maliciously obtaining sensitive information by circumventing an online access convenience access point or a thief walking into an enterprise and taking laptops illustrate the same • Platform approach provides versatility alarming issue — a major lapse in enterprise security. And regardless of the means used as access requirements change and to infiltrate an organization, the damage can be significant. business drivers evolve • Provides single platform to issue and Traditionally, physical and logical access solutions have been the responsibility of two manage certificates for smartcards distinct organizations within a company. And each are often managed by two separate • Powered by award-winning Entrust IdentityGuard and Entrust Authority administrators and systems. PKI technology Multipurpose Credentials Securing multiple access points — wireless, VPN, desktops and facilities, for example — by relying on separate, often incompatible solutions is expensive, inconvenient for end-users and difficult for administrators to manage. And legacy solutions are typically tied to different suppliers, vendors or contractors. But advances in smartcard technology have made the convergence of physical access and logical access affordable and simple to deploy. Platform Approach Comprehensive physical and logical access is secured by the use of digital certificates, public key infrastructure (PKI) and a proven strong authentication platform. Entrust is distinct in being able to bring together all of the elements necessary for physical and logical access solutions — on a single software platform — and provide the PKI to issue and manage digital certificates that are deployed to smartcards, mobile devices or USBs and distributed to end-users. And as a U.S. Federal government-approved provider of PIV and PIV-I credentials, Entrust is an expert in the Personal Identity Verification (PIV) standards that industries and enterprises are adopting to govern their authentication strategies.
  • 2. PHYSICAL Government Enterprise Interior Access/Levels Entrust IdentityGuard Partners | Employees | Customers | Suppliers | Remote Employees Authenticator LOGICAL Laptops Mobile Devices Networks FOR PHYSICAL AND LOGICAL ACCESS Figure 1: Entrust IdentityGuard leverages smartcards, mobile devices, tokens, digital certificates, biometrics and more to help realize true physical and logical access convergence in any environment. Versatile Authentication Platform Entrust’s open API architecture allows for tight By leveraging a software-based platform approach, integration with today's leading mobile device organizations can consolidate all authentication processes management (MDM), identity access management (IAM) with a single, proven solution — Entrust IdentityGuard. and public key infrastructure (PKI) vendors. This enables Entrust IdentityGuard to work with new and existing Whether it’s a smartcard or mobile smart credential for enterprise implementations, plus adds the ability to physical/logical access, or a unique grid card for strong integrate in-house or managed service-based digital authentication to a VPN, Entrust IdentityGuard is one of the certificates. most versatile authentication platforms available. It allows organizations to deploy the right authenticator to More Information different user groups based on the amount of associated For more information on Entrust solutions for physical and risk, access requirements, unique user needs and cost. logical access, contact the Entrust representative in your area at 888.690.2424 or visit entrust.com/physical-logical. About Entrust A trusted provider of identity-based security solutions, Entrust empowers enterprises, governments, financial institutions, citizens and websites in more than 4,000 organizations spanning 60 countries. Entrust’s customer-centric focus is the foundation to delivering organizations an unmatched level of security, trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Let’s talk. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved. 24268/2-12