Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Entrust Brings Government-Strength Authentication to Enterprises

Entrust announced today that it is extending its Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private sector and entities that wish to securely communicate and interoperate with the U.S. federal government.

Entrust announced today that it is extending its Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private sector and entities that wish to securely communicate and interoperate with the U.S. federal government.

PIV-I EntrustPIV-I is based on the same standards developed by the U.S. government for its employees, but it has been tailored for state, local and enterprise use. Entrust’s PIV-I solution, which includes smartcard components, has been approved by the Federal PKI Policy Authority.

Developed by the U.S. government to comply with Homeland Security Presidential Directive 12 (HSPD-12), Personal Identity Verification (PIV) credentials provide government users with physical and logical access to U.S. federal buildings and networks via a PKI-enabled smartcard. The digital identities contained in the PIV credentials are issued by Entrust for all agencies using the USAccess program and major agencies such as the U.S. Departments of Treasury, State and Labor, as well as the Department of Homeland Security (DHS), and NASA. The PIV credentials also enable government employees to digitally sign documents and e-mails — promoting secure collaboration and increasing operational efficiency.

Entrust PIV-I capabilities add government-strength physical and logical credentialing as a core component of the company’s versatile authentication platform. This platform approach enables organizations to layer security — according to access requirements or the risk of a given transaction — across diverse users and applications.

“This is an incredibly important milestone as PIV-I is critical for secure collaboration between government agencies and authorized private companies,” said Entrust President and CEO Bill Conner. “PIV-I validation also represents the natural progression of Entrust’s physical and logical access solutions, which is made possible by our PKI platform and complementary credentialing services.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.