Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Entrust Updates Mobile Credential to Verify Transactions for Mobile Business

Identity and information security solutions firm Entrust, on Tuesday announced updates to its Entrust IdentityGuard Mobile Smart Credential offering.

Identity and information security solutions firm Entrust, on Tuesday announced updates to its Entrust IdentityGuard Mobile Smart Credential offering.

Its new IdentityGuard Mobile Credential 2.0 helps protect against potentially fraudulent transactions triggered by malware, by giving users the ability to authenticate enterprise, web or cloud transactions via a mobile channel.

“By moving transactions out-of-band to the mobile channel, users cannot only review the exact details of the transaction they are about to perform, they can also confirm and approve them in real time from the convenience of their phone,” Entrust explained.

Entrust LogoAdditionally, with the new mobile smart credential, enterprises and banks can streamline business processes by eliminating requirements for in-person, paper-based signatures or desktop-bound digital signatures, Entrust said. Even documents requiring legally-binding, digital signatures can be signed directly from a phone or tablet.

“Today’s financial institutions, enterprises, and governments need to be ready to address the exponential growth of mobile device adoption and begin better leveraging this new technology to address day-to-day business needs,” said Entrust President and CEO Bill Conner. “We know mobile architecture is significantly more secure than traditional PCs, making it an ideal avenue for convenient, secure digital signing of legally-binding documents and approving of critical transactions.”

“Authenticators such as passwords or hard tokens simply don’t provide the same level of protection that one can find by using smart credentials on a mobile device. Additionally, paperwork slows down the process, frustrates employees and customers, and can even provide a roadblock to receiving revenue,” Conner added. “By using a mobile device with a smart credential, companies can protect sensitive transactions of all types by stopping the transaction midstream and sending it to a mobile device for verification.”

Entrust mobile smart credentials

As an additional benefit, mobile identities eliminate the reliance on Java, Flash or desktop device drivers, which have proven to be extremely vulnerable, and a popular attack vector for cybercriminals.

Additionally, the Entrust IdentityGuard Mobile Smart Credential 2.0 SDK lets customers embed identity-based security into their own mobile applications for mobile authentication.

Advertisement. Scroll to continue reading.

Entrust IdentityGuard Mobile Smart Credential 2.0 will continue to offer existing capabilities including authenticators for physical, logical and cloud access, as well as out-of-band transaction verification and NFC and Bluetooth integration, the company said.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.