Entrust IdentityGuard delivers mobile smart credentials

To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard Mobile Smart Credentials.

Available for the iOS, Android and BlackBerry mobile platforms, Entrust transforms mobile devices into multipurpose digital identities for authenticated access to logical networks, cloud applications, physical facilities and building entrances.

“Entrust launched its mobile platform more than three years ago and we continue to innovate with practical capabilities that secure and leverage mobile devices across the enterprise,” said Entrust President and CEO Bill Conner. “This technology helps organizations transform mobile devices into strong, multipurpose authenticators for physical, logical and cloud access while driving down the total cost of ownership as part of bring-your-own-device initiatives.”

Complimenting those capabilities, Entrust’s mobile innovation also helps organizations leverage mobile devices for strong, easy-to-use authentication, which includes two-factor authentication, out-of-band transaction confirmation, mobile smart credentials and future authenticator technology (e.g., biometrics, GPS).

Entrust IdentityGuard enables organizations to leverage everyday smartphones to easily authenticate identities for physical, logical and cloud-based resources, as well as digitally signing data. By taking advantage of near-field communication (NFC) and Bluetooth standards, Entrust embeds digital certificates on smartphones to create trusted identity credentials for stronger, more convenient enterprise authentication.

The mobile platform not only simplifies authentication for end-users, but also helps organizations reduce costs by eliminating the need for dedicated authentication hardware such as tokens, smartcards and smartcard readers.

Entrust IdentityGuard Mobile Smart Credentials augment security and user convenience by leveraging Bluetooth to automatically detect and connect to workstations — simply by prompting users to enter a PIN. And once a user leaves the proximity of their machine, the solution can automatically lock the user session, ensuring logical access to the desktop is secured at all times.

Don't miss