Entrust, Inc., a world leader in securing digital identities and information, announces the launch of an industry-leading hard token replacement program. Beginning today, organisations that currently use a hard token-based solution may trade in the devices for Entrust’s mobile and soft token factors of authentications in a one-for-one swap for up to 5,000 users.
To qualify for this special offer, organisations must either currently use Entrust IdentityGuard 9.3 or higher, or purchase the recently launched Entrust IdentityGuard 10.0. A hard token from any vendor will qualify for the program. Entrust will not require users to turn in old hard tokens. “As recognised by the most recent FFIEC guidance, the spike of critical, high profile security breaches have proven that the old one-size-fits-all hard token model is outdated and vulnerable to future attacks,” said Entrust President and CEO Bill Conner. “There is no time like the present to clear out technology that is more than 20 years old for software solutions that truly address today’s ever-changing threat landscape. Forward-thinking organisations understand the need for a software multi-factor authentication platform that not only allows for layered security, but also allows users to seamlessly move to a new authenticator in the event of a breach.” By selecting the award-winning Entrust IdentityGuard platform to replace an outdated hard-token model, organisations have the ability to address logical security needs, as well as physical security and mobile security. Through its software multi-factor versatile platform, Entrust IdentityGuard 10.0 brings together security solutions for these three distinct, yet closely knit worlds. Users can easily manage and deploy a comprehensive range of unique authenticators simultaneously which can be issued based on specific requirements, associated risk and cost. Organisations can also adjust security in real-time to meet the quickly changing threat landscapes or future regulatory requirements. As the only authentication platform that fully enables today's leading mobile platforms for business, Entrust IdentityGuard 10.0 enables the rapidly growing number of mobile devices that connect to corporate networks. Using the platform, users can easily register their mobile device through the Entrust IdentityGuard Self Service Module and have a digital ID downloaded directly onto their device. Additionally, through the Smart Credentials offered under Entrust IdentityGuard 10.0, organisations have the ability to simplify the issuance and management of Smart Cards to better integrate and secure physical and logical security. The deadline to qualify for this special promotion is Dec. 23, 2011. Want to learn more about the hard token replacement program? Visit tokentradeup.com for more details. About Entrust Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and Web sites in more than 4,000 organisations spanning 60 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. For strong authentication, fraud detection, digital certificates, SSL and PKI, call +61 2 9220 3635 e-mail firstname.lastname@example.org or visit www.entrust.com.
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana