In an era when mobile devices are commonplace, Entrust, Inc., introduces a straightforward method for adding digital certificates to mobile devices — and with little management from IT staff. Through Entrust’s self-service module, end-users add certificates to their own mobile devices via an easy-to-use interface for advanced certificate-based authentication.

“As the enterprise workplace continues to move from a traditional office setting to the use of mobile and smartphone devices, organizations are in need of stronger and more widespread security measures to protect their corporate data,” stated a commissioned study(1) conducted by Forrester Consulting on behalf of Entrust. “With the proliferation of mobile devices in the workplace, enterprises are turning to mobile applications to help supply employee demand for on-the-go access.”

This innovative Entrust IdentityGuard feature allows enterprises to provide authenticated access to VPNs, internal applications or networks, as well as enabling email decryption and signing, all on a user’s mobile device. In fact, the issued digital certificate also serves as a unique device identifier, adding yet another layer of security to the enterprise environment.

“Many vendors can issue digital certificates to mobile devices, but none are as seamless or easy for end-users as Entrust’s self-service component,” said Entrust President and CEO Bill Conner. “And the fact that organizations can manage mobile identities — just like any other identity on the versatile authentication platform — further simplifies enterprise authentication and identity-based security.”

Authorized employees, staff or contractors simply log in to the Entrust IdentityGuard Self Service Module to enroll their mobile device — compatible platforms include the Apple iPhone, Apple iPad, Android, BlackBerry, BlackBerry PlayBook and more — and are issued a digital certificate. The entire process is seamless and occurs in real-time. Digital certificates are quickly issued from an organization’s in-house Entrust certification authority (CA) or Entrust’s popular hosted PKI service.

According to a Forrester Forrsights survey, “Enterprise and SMB Networks and Telecommunications Survey, North America and Europe Q1 2010,” 18 percent of enterprises said that more than half of their employees use a smartphone for work-related activities on a weekly basis. In addition, 91 percent of responding enterprises have deployed or are planning to implement wireless email for employees.(1)

“The age of the smartphone in the enterprise is clearly here, and there is nothing organizations can do to avoid this wave,” stated the Forrester study.

Entrust enables organizations to layer security — according to access requirements or the risk of a given transaction — across diverse users and applications. Entrust’s authentication capabilities include smartcards and USB tokens, soft tokens, grid cards and eGrids, IP-geolocation, questions and answers, out-of-band one-time passcode (delivered via voice, SMS or email), and a range of one-time-passcode tokens. In addition, digital certificates are used on mobile devices, in software and on smartcards and USB tokens.

For organizations that prefer to issue digital certificates through a PKI, Entrust Managed Services PKI establishes and maintains a trustworthy environment by providing certificates that secure many off-the-shelf applications using encryption, digital signatures and strong certificate authentication. The hosted PKI solution enables organizations to control access to resources, prevent theft of information and comply with privacy and digital signature regulations. Organizations can quickly and easily issue certificates to partners, suppliers, customers and distributors, making it easy to conduct business securely.

(1) “2FA And Mobile Devices: Providing More Flexible Protection To Corporate Data Assets In Corporate Applications,” a commissioned study conducted by Forrester Consulting on behalf of Entrust, May 2011.

1 comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: