Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Entrust Combines Certificate Management, Credentialing Solution in Cloud-based Platform

Entrust IdentityGuard Simplifies Management of SSL, PKI, Certificate Discovery, Device Certificates and Credentialing

Entrust IdentityGuard Simplifies Management of SSL, PKI, Certificate Discovery, Device Certificates and Credentialing

Entrust, a provider of Identity management and authentication solutions, announced the launch of Entrust IdentityGuard, a new cloud-based service that consolidates the management of digital identities, SSL certificates and credentials via a single solution platform.

Dallas, Texas-based Entrust, which was recently acquired by Datacard Group in a deal reportedly valued at $500 million, said that it is consolidating its most popular certificate and credentialing solutions under the Entrust IdentityGuard Cloud Services portfolio in order to provide customers with a unified management console that offers visibility, ease of use and scalability.

EntrustWhen announcing the acquisition, Entrust disclosed its plans to accelerate investments in personalization, identity and credentialing solutions, and today’s announcement marks the first step toward that goal.

[ResourceIs Your Enterprise Managing Certificates? Three Reasons It Should Be.]

The new solution introduces a more integrated product offering and offers customers five distinct components under a more consolidated brand, including:

• Entrust IdentityGuard Cloud Services SSL (formerly Entrust Certificate Management Service)

• Entrust IdentityGuard Cloud Services Discovery (formerly Entrust Discovery)

• Entrust IdentityGuard Cloud Services Smart Credentials (expected later in 2014)

• Entrust IdentityGuard Cloud Services PKI (formerly Entrust Managed Services PKI; expected later 2014)

• Entrust IdentityGuard Cloud Services Device Certificates

Housed in secure facilities, the infrastructure for Entrust’s IdentityGuard Cloud Services features a highly available and fully redundant framework with intelligent monitoring, and robust data backup and disaster recovery, the company said. Additionally, certain offerings of certificate-related services are trusted by and cross-certified with the U.S. Federal Bridge Certification Authority (FBCA).

“With the substantial increase in connected devices and distributed computing, strong identity solutions are more important than ever as a critical security layer,” said David “Organizations often deploy separate, disparate point solutions that result in difficult, time-consuming and expensive deployment and management,” David Wagner, president of Entrust, said in a statement. “By consolidating identity management in the cloud, the Entrust solution helps reduce expenses, deployment challenges and management headaches that stem from legacy security solutions and techniques.”

Related ResourceForrester Attacks On Trust Report


Related InsightIs Your Enterprise Managing Certificates? Three Reasons It Should Be.

Related ResourceBroken Trust: Exposing the Malicious Use of Digital Certificates and Cryptographic Key

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.