Entrust

Displaying 1-29 of 29 results

  • White Papers // Jul 2009

    Why Outsourcing Your PKI Provides the Best Value: A Total Cost of Ownership Analysis

    Once one conclude that one needs a certificate to exchange information online securely, turn on the security inherent in existing applications, or authenticate to users, computers, VPN, the Web, or buildings, the next point of determination is: how can I do this cost-effectively without forfeiting quality? The answer is simple:...

    Provided By Entrust

  • White Papers // Jun 2009

    Addressing Online eCrime: Layered Security for Addressing Fraud Today ... and Adapting to Tomorrow

    Institutions must strategically develop and deploy additional online safeguards, including strong authentication infrastructures, as identified by the assessment. Security threats will continue to evolve and organizations must develop solutions that can adapt to future challenges and protect consumers for the long term. This paper presents an overview of affordable security...

    Provided By Entrust

  • White Papers // Apr 2009

    Establishing Trust With Online Processes: Securing Documents With Adobe Certified Document Services

    Now more than ever, organizations have reasons for moving processes online - cost-savings, environmental responsibility, faster response times and more. The public is bombarded with information on phishing attacks, viruses, malware and online identity theft. This has led to skepticism in electronically delivered information. Customers want to be sure that...

    Provided By Entrust

  • White Papers // Jan 2009

    Quantum Computing and Cryptography: Their Impact on Cryptographic Practice

    Quantum cryptography may find application in certain specific applications. For example, in securing metropolitan area data links. However, the constraints upon its use do not make it a practical solution for many popular applications of cryptography at this time. If research into quantum routers and quantum digital signatures bears fruit,...

    Provided By Entrust

  • Webcasts // Jan 2009

    The Remote Access Revolution: Secure Access to Your Enterprise Network

    When an employee or partner accesses a network through an extranet, remote access gateway or desktop, they have effectively opened a door to the organization's most sensitive assets, intellectual property and customer data. What should be done to protect the organization and the users? The attendee of this webcast will...

    Provided By Entrust

  • Webcasts // Jan 2009

    Three Best Practices for Securing Microsoft Exchange

    The presenter of this webcast reviews several of the advancements in Microsoft Exchange and discusses three best practices of a layered security approach. Adding cost-effective strong authentication for remote users of Outlook Web Access, including a range of choices from invisible IP-geolocation and device fingerprinting to tangible forms such as...

    Provided By Entrust

  • Webcasts // Jan 2009

    Hitting a Moving Target: Protecting You & Your Customers From Online Fraud

    This webcast shows how to protect customers from online fraud.

    Provided By Entrust

  • Webcasts // Jan 2009

    Winning Enterprise Authentication: 5 Key Steps for Success

    The need to boost identity assurance is vital across multiple industries. The increasing pressure to make more information available to employees anywhere, anytime, must be balanced with the pressure for corporate and regulatory compliance. The attendee will learn how to side-step these challenges and successfully deploy strong authentication.

    Provided By Entrust

  • Case Studies // Jan 2009

    The Chase Manhattan Bank Chase EC Gateway

    Chase Treasury Solutions provides traditional and emerging technology treasury management services to corporations, financial institutions, brokers and dealers, and public-sector organizations. It offers receivable, payable and liquidity management services, and creates technology solutions to provide clients access to a full range of capabilities. Chase EC GatewaySM is one such solution....

    Provided By Entrust

  • Case Studies // Jan 2009

    Entrust Gets an "A" for Entrust Certificate Management Service From Commission Scolaire Marie-Victorin

    Keeping student grades private and confidential online is a priority for Normand Martin, the manager for the Network Support Group at Commission Scolaire Marie-Victorin. Commission Scolaire Marie-Victorin is an education bureau that takes care of over 80 schools, 8,000 employees and over 40,000 students within its district. The issue they...

    Provided By Entrust

  • Case Studies // Jan 2009

    Credit Suisse Group Uses Entrust Technology to Secure Desktop Applications

    Credit Suisse Group is a leading global financial services company headquartered in Switzerland. Credit Suisse Group needed security capabilities that would provide an effective means of authenticating users and ensuring accountability and confidentiality. Credit Suisse Group's main focus when choosing the Entrust solution was to achieve more effective authentication of...

    Provided By Entrust

  • Case Studies // Jan 2009

    Providing Secure Legal Information Online Enables Higher Productivity for FDBL

    Fragomen, Del Rey, Bernsen &Loewy, P.C.(FDBL) is the world's largest firm practicing exclusively in the area of global immigration and nationality law for the corporate sector. FDBL wanted security that would be virtually transparent to end users, to enable a higher level of productivity and efficiency. Furthermore, they required a...

    Provided By Entrust

  • Case Studies // Jan 2009

    Electric Power Industry Gets Powerful Internet Security Technology - U.S. Electric Utility Companies Face the Internet

    It is common in the United States to have some parts of the country face energy shortages while other parts face energy surpluses. This fluctuation in demand and generation is due to a number of factors such as the climate, time of year, and unforeseen events. The World Wide Web...

    Provided By Entrust

  • Case Studies // Jan 2009

    Federal Government Department Uses Entrust-Ready Forms Application to File Documents Online

    As the Internet increases in popularity as a medium for doing business, the Investment Review Division of Industry Canada (IRD) is taking advantage of new technologies to enhance their collection and filing process. The strict confidential nature of the information will be maintained by having the body of the message...

    Provided By Entrust

  • Case Studies // Jan 2009

    Large Computer Manufacturer Paves the Way to the "Security Assured Organization"

    As one of the largest computer manufacturers in the world, the company understands the importance of protecting IT investments. As one of the companies that created the computer revolution, the company understands the power of personal computing. But with desktop and laptop computers containing some of the company's most sensitive...

    Provided By Entrust

  • Case Studies // Jan 2009

    Qunara Inc. Builds Security Solution for Large Service Company

    Qunara Inc. recently completed the implementation of an Entrust Public-Key Infrastructure (PKI) for the head office of a large service company. The communications infrastructure for this database needed to support the daily exchange of high volumes of information and to be assembled in a manner that encouraged the franchises to...

    Provided By Entrust

  • Case Studies // Jan 2009

    Mackenzie Financial Corporation Gives Financial Advisors Secure Web-Based Access to Accounts, Investment Portfolios

    Within the competitive, fluid and often unpredictable marketplace, today's financial advice quickly becomes yesterday's. Helping Canadians to build financial independence by staying a step ahead with their mutual fund, trust and investment strategies is Toronto-based Mackenzie Financial's business and has helped make the company a leader in the Canadian mutual...

    Provided By Entrust

  • Case Studies // Jan 2009

    Pacific Northwest National Laboratory Bolsters Internet Security With Entrust

    A leading global provider of Internet security solutions and services, today announced that Pacific Northwest National Laboratory (PNNL), one of nine multi-program national laboratories within the Department of Energy (DOE), has successfully deployed a suite of Entrust software solutions to set the stage for greater collaboration with other DOE labs,...

    Provided By Entrust

  • Case Studies // Jan 2009

    Perot Systems Chooses Entrust to Connect Its Global Mobile Workforce

    Perot Systems is a worldwide provider of information technology services and business solutions to large multinational enterprises. Perot Systems needed a way to provide secure access to multiple application environments without increasing the administrative support needed to maintain this secure network. Perot Systems turned to Entrust for help in meeting...

    Provided By Entrust

  • Case Studies // Jan 2009

    Entrust Saves Canadian Federal Government Millions of Dollars

    Like most government departments, Public Works and Government Services Canada (PWGSC) is concerned about network security. The need for secure electronic commerce and information exchange is becoming paramount to the Department's daily operation. The Government has incorporated Entrust in its Public-Key Infrastructure (PKI). The PKI allows users to secure local...

    Provided By Entrust

  • Case Studies // Jan 2009

    Quebec Ministry of Justice - The Register of Personal and Movable Real Rights

    In the province of Quebec, there are more than 110 different natures of rights that individuals can register in a single source - the Register of personal and movable real rights (RPMRR). Registration in the RPMRR constitutes reliable protection for anyone holding rights on movable property, as well as for...

    Provided By Entrust

  • Case Studies // Jan 2009

    Schlumberger: A Secure Foundation for Growth

    When Schlumberger set out to develop a comprehensive system for securing its corporate data and electronic communications, the company faced a two-fold challenge. Like any global enterprise, it had to address issues of scalability, manageable deployment and integration. At the same time, being a worldwide provider of information services, the...

    Provided By Entrust

  • Case Studies // Jan 2009

    Anti-Drug Information System: Improving Homeland Security Through Law Enforcement Information Sharing

    Putting the right information in law enforcement agents' hands is crucial to keeping borders secure and combating drug trafficking and other crimes. Since 1997, the Southwest Border States Anti-Drug Information System (SWBSADIS) has been enabling secure information sharing among law enforcement agencies in the Southwest states and with Federal law...

    Provided By Entrust

  • Case Studies // Jan 2009

    Illinois E-Government Enabled by Entrust Enhanced Internet Security

    The State of Illinois has transformed itself into an E-Government leader by redesigning the delivery of government services. Illinois ranked 49th among states in using information technology to deliver services to its citizens. Illinois is now tied for first in the nation according to the 2001 Digital State survey conducted...

    Provided By Entrust

  • Case Studies // Jan 2009

    Teranet's Online Land Registry System Makes Legal Process Quicker and Easier

    Toronto-based Teranet, Inc. is an e-commerce company that develops Business-To-Government (B2G) and Business-To-Business (B2B) e-service solutions that enable organizations to greatly enhance the services they provide to their customers. Teranet had a long list of requirements to complete land registry transactions electronically. The system was absolutely mission-critical to both the...

    Provided By Entrust

  • Case Studies // Jan 2009

    The United States Patent and Trademark Office

    Be more responsive, improve service, and provide better access. These guiding principles resonate loudly with the employees and customers of the U.S. Patent and Trademark Office (USPTO). As a result of the 1990 Omnibus Reconciliation Act and the American Inventors Protection Act, the USPTO needed to operate more like a...

    Provided By Entrust

  • Case Studies // Jan 2009

    Veterans Affairs Canada Uses Entrust Solution to Secure On-Line Project

    Veterans Affairs' mission is to provide exemplary, client-centred services and benefits that are responsive to clients' needs. Veterans Affairs' desire to deliver expeditious service to clients required service delivery enhancements to its existing Disability Pension Program. The Disability Pension Program awards disability pensions to qualified individuals for disability or death...

    Provided By Entrust

  • White Papers // Jan 2009

    Exploiting Weaknesses in the MD5 Hash Algorithm to Subvert Security on the Web

    A group of renowned researchers has published some of the details of their exploitation of a vulnerability in the MD5 hash algorithm. The advance they describe would allow an attacker to create fraudulent Web-site certificates with which they could launch a phishing or man-in-the-middle attack on an eCommerce, eBanking or...

    Provided By Entrust

  • White Papers // Mar 2008

    Encryption 101: Eight Common Encryption Issues Facing Organizations Today

    Pressures are mounting for organizations to implement encryption solutions. From regulatory compliance, to partner demands and the staggering costs of data loss, encryption projects are on the rise. This paper explores the most common issues organizations face when making decisions about which types of encryption solutions to use. Having a...

    Provided By Entrust

  • White Papers // Jan 2009

    Quantum Computing and Cryptography: Their Impact on Cryptographic Practice

    Quantum cryptography may find application in certain specific applications. For example, in securing metropolitan area data links. However, the constraints upon its use do not make it a practical solution for many popular applications of cryptography at this time. If research into quantum routers and quantum digital signatures bears fruit,...

    Provided By Entrust

  • Webcasts // Jan 2009

    The Remote Access Revolution: Secure Access to Your Enterprise Network

    When an employee or partner accesses a network through an extranet, remote access gateway or desktop, they have effectively opened a door to the organization's most sensitive assets, intellectual property and customer data. What should be done to protect the organization and the users? The attendee of this webcast will...

    Provided By Entrust

  • Webcasts // Jan 2009

    Three Best Practices for Securing Microsoft Exchange

    The presenter of this webcast reviews several of the advancements in Microsoft Exchange and discusses three best practices of a layered security approach. Adding cost-effective strong authentication for remote users of Outlook Web Access, including a range of choices from invisible IP-geolocation and device fingerprinting to tangible forms such as...

    Provided By Entrust

  • Webcasts // Jan 2009

    Hitting a Moving Target: Protecting You & Your Customers From Online Fraud

    This webcast shows how to protect customers from online fraud.

    Provided By Entrust

  • Webcasts // Jan 2009

    Winning Enterprise Authentication: 5 Key Steps for Success

    The need to boost identity assurance is vital across multiple industries. The increasing pressure to make more information available to employees anywhere, anytime, must be balanced with the pressure for corporate and regulatory compliance. The attendee will learn how to side-step these challenges and successfully deploy strong authentication.

    Provided By Entrust

  • White Papers // Jul 2009

    Why Outsourcing Your PKI Provides the Best Value: A Total Cost of Ownership Analysis

    Once one conclude that one needs a certificate to exchange information online securely, turn on the security inherent in existing applications, or authenticate to users, computers, VPN, the Web, or buildings, the next point of determination is: how can I do this cost-effectively without forfeiting quality? The answer is simple:...

    Provided By Entrust

  • Case Studies // Jan 2009

    The Chase Manhattan Bank Chase EC Gateway

    Chase Treasury Solutions provides traditional and emerging technology treasury management services to corporations, financial institutions, brokers and dealers, and public-sector organizations. It offers receivable, payable and liquidity management services, and creates technology solutions to provide clients access to a full range of capabilities. Chase EC GatewaySM is one such solution....

    Provided By Entrust

  • Case Studies // Jan 2009

    Entrust Gets an "A" for Entrust Certificate Management Service From Commission Scolaire Marie-Victorin

    Keeping student grades private and confidential online is a priority for Normand Martin, the manager for the Network Support Group at Commission Scolaire Marie-Victorin. Commission Scolaire Marie-Victorin is an education bureau that takes care of over 80 schools, 8,000 employees and over 40,000 students within its district. The issue they...

    Provided By Entrust

  • Case Studies // Jan 2009

    Credit Suisse Group Uses Entrust Technology to Secure Desktop Applications

    Credit Suisse Group is a leading global financial services company headquartered in Switzerland. Credit Suisse Group needed security capabilities that would provide an effective means of authenticating users and ensuring accountability and confidentiality. Credit Suisse Group's main focus when choosing the Entrust solution was to achieve more effective authentication of...

    Provided By Entrust

  • Case Studies // Jan 2009

    Providing Secure Legal Information Online Enables Higher Productivity for FDBL

    Fragomen, Del Rey, Bernsen &Loewy, P.C.(FDBL) is the world's largest firm practicing exclusively in the area of global immigration and nationality law for the corporate sector. FDBL wanted security that would be virtually transparent to end users, to enable a higher level of productivity and efficiency. Furthermore, they required a...

    Provided By Entrust

  • Case Studies // Jan 2009

    Electric Power Industry Gets Powerful Internet Security Technology - U.S. Electric Utility Companies Face the Internet

    It is common in the United States to have some parts of the country face energy shortages while other parts face energy surpluses. This fluctuation in demand and generation is due to a number of factors such as the climate, time of year, and unforeseen events. The World Wide Web...

    Provided By Entrust

  • Case Studies // Jan 2009

    Federal Government Department Uses Entrust-Ready Forms Application to File Documents Online

    As the Internet increases in popularity as a medium for doing business, the Investment Review Division of Industry Canada (IRD) is taking advantage of new technologies to enhance their collection and filing process. The strict confidential nature of the information will be maintained by having the body of the message...

    Provided By Entrust

  • Case Studies // Jan 2009

    Large Computer Manufacturer Paves the Way to the "Security Assured Organization"

    As one of the largest computer manufacturers in the world, the company understands the importance of protecting IT investments. As one of the companies that created the computer revolution, the company understands the power of personal computing. But with desktop and laptop computers containing some of the company's most sensitive...

    Provided By Entrust

  • Case Studies // Jan 2009

    Qunara Inc. Builds Security Solution for Large Service Company

    Qunara Inc. recently completed the implementation of an Entrust Public-Key Infrastructure (PKI) for the head office of a large service company. The communications infrastructure for this database needed to support the daily exchange of high volumes of information and to be assembled in a manner that encouraged the franchises to...

    Provided By Entrust

  • Case Studies // Jan 2009

    Mackenzie Financial Corporation Gives Financial Advisors Secure Web-Based Access to Accounts, Investment Portfolios

    Within the competitive, fluid and often unpredictable marketplace, today's financial advice quickly becomes yesterday's. Helping Canadians to build financial independence by staying a step ahead with their mutual fund, trust and investment strategies is Toronto-based Mackenzie Financial's business and has helped make the company a leader in the Canadian mutual...

    Provided By Entrust

  • Case Studies // Jan 2009

    Pacific Northwest National Laboratory Bolsters Internet Security With Entrust

    A leading global provider of Internet security solutions and services, today announced that Pacific Northwest National Laboratory (PNNL), one of nine multi-program national laboratories within the Department of Energy (DOE), has successfully deployed a suite of Entrust software solutions to set the stage for greater collaboration with other DOE labs,...

    Provided By Entrust

  • Case Studies // Jan 2009

    Perot Systems Chooses Entrust to Connect Its Global Mobile Workforce

    Perot Systems is a worldwide provider of information technology services and business solutions to large multinational enterprises. Perot Systems needed a way to provide secure access to multiple application environments without increasing the administrative support needed to maintain this secure network. Perot Systems turned to Entrust for help in meeting...

    Provided By Entrust

  • Case Studies // Jan 2009

    Entrust Saves Canadian Federal Government Millions of Dollars

    Like most government departments, Public Works and Government Services Canada (PWGSC) is concerned about network security. The need for secure electronic commerce and information exchange is becoming paramount to the Department's daily operation. The Government has incorporated Entrust in its Public-Key Infrastructure (PKI). The PKI allows users to secure local...

    Provided By Entrust

  • Case Studies // Jan 2009

    Quebec Ministry of Justice - The Register of Personal and Movable Real Rights

    In the province of Quebec, there are more than 110 different natures of rights that individuals can register in a single source - the Register of personal and movable real rights (RPMRR). Registration in the RPMRR constitutes reliable protection for anyone holding rights on movable property, as well as for...

    Provided By Entrust

  • Case Studies // Jan 2009

    Schlumberger: A Secure Foundation for Growth

    When Schlumberger set out to develop a comprehensive system for securing its corporate data and electronic communications, the company faced a two-fold challenge. Like any global enterprise, it had to address issues of scalability, manageable deployment and integration. At the same time, being a worldwide provider of information services, the...

    Provided By Entrust

  • Case Studies // Jan 2009

    Anti-Drug Information System: Improving Homeland Security Through Law Enforcement Information Sharing

    Putting the right information in law enforcement agents' hands is crucial to keeping borders secure and combating drug trafficking and other crimes. Since 1997, the Southwest Border States Anti-Drug Information System (SWBSADIS) has been enabling secure information sharing among law enforcement agencies in the Southwest states and with Federal law...

    Provided By Entrust

  • Case Studies // Jan 2009

    Illinois E-Government Enabled by Entrust Enhanced Internet Security

    The State of Illinois has transformed itself into an E-Government leader by redesigning the delivery of government services. Illinois ranked 49th among states in using information technology to deliver services to its citizens. Illinois is now tied for first in the nation according to the 2001 Digital State survey conducted...

    Provided By Entrust

  • Case Studies // Jan 2009

    Teranet's Online Land Registry System Makes Legal Process Quicker and Easier

    Toronto-based Teranet, Inc. is an e-commerce company that develops Business-To-Government (B2G) and Business-To-Business (B2B) e-service solutions that enable organizations to greatly enhance the services they provide to their customers. Teranet had a long list of requirements to complete land registry transactions electronically. The system was absolutely mission-critical to both the...

    Provided By Entrust

  • Case Studies // Jan 2009

    The United States Patent and Trademark Office

    Be more responsive, improve service, and provide better access. These guiding principles resonate loudly with the employees and customers of the U.S. Patent and Trademark Office (USPTO). As a result of the 1990 Omnibus Reconciliation Act and the American Inventors Protection Act, the USPTO needed to operate more like a...

    Provided By Entrust

  • Case Studies // Jan 2009

    Veterans Affairs Canada Uses Entrust Solution to Secure On-Line Project

    Veterans Affairs' mission is to provide exemplary, client-centred services and benefits that are responsive to clients' needs. Veterans Affairs' desire to deliver expeditious service to clients required service delivery enhancements to its existing Disability Pension Program. The Disability Pension Program awards disability pensions to qualified individuals for disability or death...

    Provided By Entrust

  • White Papers // Jun 2009

    Addressing Online eCrime: Layered Security for Addressing Fraud Today ... and Adapting to Tomorrow

    Institutions must strategically develop and deploy additional online safeguards, including strong authentication infrastructures, as identified by the assessment. Security threats will continue to evolve and organizations must develop solutions that can adapt to future challenges and protect consumers for the long term. This paper presents an overview of affordable security...

    Provided By Entrust

  • White Papers // Mar 2008

    Encryption 101: Eight Common Encryption Issues Facing Organizations Today

    Pressures are mounting for organizations to implement encryption solutions. From regulatory compliance, to partner demands and the staggering costs of data loss, encryption projects are on the rise. This paper explores the most common issues organizations face when making decisions about which types of encryption solutions to use. Having a...

    Provided By Entrust

  • White Papers // Apr 2009

    Establishing Trust With Online Processes: Securing Documents With Adobe Certified Document Services

    Now more than ever, organizations have reasons for moving processes online - cost-savings, environmental responsibility, faster response times and more. The public is bombarded with information on phishing attacks, viruses, malware and online identity theft. This has led to skepticism in electronically delivered information. Customers want to be sure that...

    Provided By Entrust

  • White Papers // Jan 2009

    Exploiting Weaknesses in the MD5 Hash Algorithm to Subvert Security on the Web

    A group of renowned researchers has published some of the details of their exploitation of a vulnerability in the MD5 hash algorithm. The advance they describe would allow an attacker to create fraudulent Web-site certificates with which they could launch a phishing or man-in-the-middle attack on an eCommerce, eBanking or...

    Provided By Entrust