X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 entrust authentication


Entrust
Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries

entrust authentication  Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises, and governments in 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include secure socket layer (SSL), authentication, fraud detection, shared data protection, and e-mail security. Entrust's first public-key

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Firewall RFI/RFP Template

Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more 

Evaluate Now

Documents related to » entrust authentication

Using PKI to Protect Your Business Information


Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. Like ERP and CRM infrastructures, a Public Key infrastructure has become an enabler of business objectives. PKI provides a systematic approach to information security.

entrust authentication   Read More

Fostering the “Entrusted” Cloud Community


E2open's recent win at Yanfeng Visteon introduced the E2open Collaboration Center as part of E2Open Business Network (EBN). This command center-like module consists of E2open products and services that provide real-time dashboard visibility for various partners on the network into demand and supply changes. It also provides access to analytics to assess the operational and financial impact of

entrust authentication   Read More

PKI and Biometrics Ready for Take-Off


Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink.

entrust authentication   Read More

Security Considerations When Deploying Remote Access Solutions


Effective network security is most successful when you use a layered approach, with multiple defense factors in the overall solution. Successful remote access solutions provide effective authentication and access control—and you must take care to ensure your data can be transported securely over the network. Learn about the components of a layered strategy, and how to provide embedded systems with remote access ability.

entrust authentication   Read More

How to Reduce Business Risk through Secure User Access for SAP


Unencrypted communication between users’ workstations and the backend SAP servers is a significant vulnerability to your SAP environment. This can put the confidential data inside your SAP systems and your entire business activity at risk—and have a negative impact on your customers. Find out how to reduce business risks and improve audit results through encrypted communication and two-factor user authentication for SAP.

entrust authentication   Read More

Why Would Anyone Need More Than 50 IP Addresses?


A major “issue” (a/k/a bug) has been uncovered in Windows 2000 Server. A consulting firm has found that administrators cannot add more than 51 IP addresses – potentially a tremendous problem for ISPs and other customers.

entrust authentication   Read More

Wetmetrics


The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application.

entrust authentication   Read More

BI Portal from Enterprise Software Solutions Is Now a TEC Certified Application


Business Intelligence Portal (BI Portal) from Enterprise Software Solutions (ESS) has become part of TEC’s group of certified BI applications, and is now available for online evaluation in comparison with other BI software solutions in TEC’s Business Intelligence and Data Management Evaluation Center. ESS, a US-based software provider with offices in Mexico, Colombia, South Africa, and Bulgaria

entrust authentication   Read More

President Proposes Security of Medical Records


President Clinton has announced plans to ensure the privacy of patient medical records. This initiative will prove to be extremely expensive, and will pose a number of technology challenges. How can vendors get a piece of the pie? Who will administer the security of such a large infrastructure development and what products will be used? What organization is best positioned to evaluate the products such a project may require?

entrust authentication   Read More

Centralized Management for UNIX, Linux, Mac, Web, and Database Platforms


Integrating UNIX, Linux, Mac, Web, and database platforms includes securing all systems with the same authentication, authorization, and group policy services you use for Windows. How can this be done, without intrusive reconfiguration of your existing systems, while still providing the necessary granular administrative control? Learn how to leverage a centralized identity management tool leveraged with Active Directory.

entrust authentication   Read More