0% found this document useful (0 votes)
52 views17 pages

Entrust Identity As A Service Ebook

Uploaded by

nperna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views17 pages

Entrust Identity As A Service Ebook

Uploaded by

nperna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

ebook

Entrust Identity
as a Service
Cloud-based platform for intelligent
identity and access management
Digital business demands a modern identity strategy

For today’s digital business, home-grown manual IAM approaches


aren’t sufficient because they can’t: 1) authenticate customers
without negatively affecting their experience 2) support employees’
demand for access to more apps and data 3) support the rapid
adoption of cloud services 4) provide secure, regulation compliant,
and cost-effective data integration across multiple user populations.

— Evolve Your IAM Strategy For Your Digital Business


Merritt Maxim & Andras Cser, Forrester
December 4, 2020

2
Table of contents
THE IDENTITY PLATFORM THAT
REDEFINES AUTHENTICATION

Today, enterprises are dynamic and ever-evolving. Transformational Use Cases

Furthermore, adoption of mobile and cloud applications are VPN ACCESS................................................................................. 4


Streamline remote access
changing the business paradigm.

In parallel, authentication needs are changing. Passwords MOBILE............................................................................................ 6


Unlock the power of mobile
and other legacy authentication methods just don’t cut
it anymore. As enterprises transform digitally, they need
authentication solutions that tie seamlessly into today’s CLOUD SSO................................................................................... 8
Seamless access to all apps
working environment and the needs of today’s users –
as well as a foundation for future needs and growth.
PASSWORDLESS LOGIN....................................................... 10
Seamless and secure login and logout

A modern approach to digital identity CUSTOMER AND PARTNER PORTALS.............................12


protects sensitive applications and Digitally connect and collaborate
data; unifies treatment across channels,
populations, and hosting models; and scales PRIVILEGED USERS..................................................................14
Critical on-premises systems and apps
to meet today’s dynamic business needs.

Evolve: Your IAM Strategy For Your Digital Business


Merritt Maxim & Andras Cser, Forrester
December 4, 2020
3
VPN access
Streamline remote access Secure and simple VPN access is
now a necessity
Out there in the real world, the people who drive the business need to get things
done — and they see the devices and systems they use as part of the solution.
What they don’t need is for them to be part of the problem. And when it’s the
latter, it’s a problem for everyone – the team, the client, and the enterprise.

Unleash the power of VPN access

• Tailor security requirements to all your • Simplify provisioning and deployment Workers use an average of
user groups 3 DEVICES EVERY DAY
• Minimize infrastructure costs to do their work1
• Contextual and behavioral adaptive
authentication

72% of the world’s


employees will be
mobile workers by 2020

Key takeaway
Work anytime, anywhere with secure and simplified VPN access.

1. Citrix Mobility Statistics, 2015


4
VPN access

The challenge The solution


Remote teams need access to applications in the digital Mobile push authentication puts the power of the
enterprise, and they need them fast, securely, and enterprise in the hands of the people driving it forward.
seamlessly. In a world of real-time competitiveness, the Transforming the user experience with just a push of a
friction of complex authentication is a serious threat to button, employees can quickly and easily log in to their
the enterprise. VPN – removing user frustration.
Hard tokens that are time-consuming, passwords that Alternatively, the added value of mobile smart
are easily forgotten – the challenge of getting into credentials push authentication builds on the public key
VPNs internally and remotely is a pain point employees infrastructure because the private key never leaves the
don’t need. device. It not only offers the edge for physical access
And individually keying in passcodes, character by and smart card login, it also extends compliance to a
character, is desktop ergonomics in a mobile age – it’s wide array of regulated markets.
slamming the brakes on your team before they’ve even
gotten into the race.
And, crucially, mobile smart credentials keep the
business protected and secure. It also simplifies the
I trust that
process by leveraging transparent two-factor
authentication, which ensures the network can trust the security can
be simple
identity of the person trying to access it.

CHOOSE ENTRUST IDENTITY AS A SERVICE FOR VPN ACCESS


• Mobile Smart Credential • Face recognition
• Adaptive authentication • Scale on demand
• Mobile push • Proven integrations for all major VPN solutions
• Biometrics

5
Mobile
Enabling a trusted mobile experience Mobile is reshaping
the enterprise
Mobility has reshaped the enterprise, and employees have become used to a
blended day of work and life that revolves around their device and the amazing
convenience that can deliver. Go one step further and transform the user’s mobile
device into their trusted workplace identity, wherever that may be, with the option
to grant secure access to company resources passwordlessly.

This new mobility is a gift for the enterprise. In just a few years, mobile devices
Annual increase
have pushed productivity levels to peaks that were, not long ago, unimaginable.
in managed devices2
But nothing comes without risk. And managing this risk is a day-to-day challenge
for all IT departments.

Unleash the power of mobile


• Go passwordless • Highest level of security

• Totally transparent to the user •S


 treamline access to your digital
enterprise Company leaders believe
• Increase employee productivity significant remote
• Unified platform experience workforce is permanent3

Key takeaway
Frictionless user experience with the highest level of assurance, delivering
increased productivity.

LE AR N M O R E 2. IDC Mobile Worker Forecast, 2015


3. Gartner Return to the Workplace Benchmarking Against Your Peers Webinar Poll, 2020
6
Mobile

The challenge The solution


Employees are spread across different locations and out Enterprises that face sophisticated attacks every day
in the field, demanding the same access to applications also need to deliver a seamless experience to employees
that they enjoy in the office. But nothing comes for free. working hard to give their company the edge. It’s a
Along with the ubiquity of tablets and smartphones and tough call.
the powerful business impacts they bring, comes a new The solution is a trusted digital identity delivering a user
security paradigm. experience that takes the friction and frustration out of
The world of work may have migrated from desktop to authentication. Now, a virtual smart card embedded in a
mobile, but how do you protect the enterprise in a digital device can deliver seamless, secure, mobile access that’s
world packed with security challenges? An alternative invisible to the user and indispensable for the IT guy.
token, such as the derived personal identity verification Liberated from the pain of old school authentication,
(PIV), takes the usability of authentication to a new level. staff work harder, faster, and more competitively. The
In regulated environments especially, where PIV
authentication is mandated, organizations are forced to
successful fusion of usability and strong security is no
longer a theory — and it’s putting the power of anytime,
I trust
find a solution that utilizes a virtual smart card. anywhere identity authentication at the heart of the
enterprise. hands-free
authentication.
CHOOSE ENTRUST IDENTITY FOR MOBILE
•N ative integration with leading EMM •S oftware developer kits (SDKs) to embed identities
applications into a mobile platform
• Adaptive authentication • Mobile pre-check
• Mobile as a Service Smart Credential • Mobile push

7
Cloud SSO
Seamless access to all apps Cloud is a must-have

Cloud solutions such as Microsoft Office 365, Salesforce, and Box have disrupted
traditional business practices by changing user behavior and expectations.

Because of the rapid adoption of the cloud, there is a need to decouple


credentials for every unique cloud application so the organization can leverage a
single, strong credential. The results streamline user access as the same credential
can be used for internal apps, VPN, and workstations for example. And it allows Without cloud apps, tools,
you to control your authentication policy rather than having to rely on individual and services, we could not
Software-as-a-Service provider approaches. have sent millions of workers
home, maintained global
Unleash the power of cloud SSOs supply chains, or shifted
entire business models in a
• One identity to access on-premises •T
 ailored experiences for every user matter of weeks
and cloud applications
•F
 ewer IT help desk calls
• Improved user experience with
NEARLY
transparent security and broad
enablement 9-IN-10 CEOs
View cloud-based
infrastructure as the key
to growth4

Key takeaway
Work anytime, anywhere with secure and simplified VPN access.

I N FOG R APH I C
4. Forbes Insights 2016 Study, “How to Win at Digital Transformation: Five Steps Digital Transformation Leaders are Taking”
8
Cloud SSO

The challenge The solution


The growing business needs tools – and lots of them. Identity as a Service means that you only have to
Tools that allow users to manage multiple credentials authenticate once to get instant access to all your
and avoid the security nightmare of passwords being business-critical apps.
reused for every application. With SSO, you’re in. No passwords, no tokens, no cards,
Office 365, Salesforce, and Google Docs are just some just a secure, seamless experience. And with the
of the critical applications digital business employees top-level assurance capabilities required by government
need at their fingertips — instantly and without a second departments and global finance organizations, you can
thought. But in a climate of daily threats and security enjoy secure access to internal enterprise apps, web
challenges, IT needs frictionless, high assurance methods apps, Microsoft environment, and any other web access
that protect outside the traditional enterprise security management systems. The same credential can be used
parameters. for VPN and workstation access and you can configure
IT professionals need a security platform that spans all
the tools of the digital business. It’s a tough ask in a
the service, so it’s up and running in minutes.
I trust in
tough market.
a security
platform that
spans all our
digital business
CHOOSE ENTRUST IDENTITY AS A SERVICE FOR CLOUD SSO
•  asswordless access
P •R  eal-time security reporting standards (SAML)

needs.
• User self service based integrations
• Adaptive risk-based authentication • Effective provisioning with integration to Active Directory
• Advanced mobile security • Configure/deploy in minutes or hours versus weeks
• Cloud or legacy apps and months
9
Passwordless login
Seamless and secure login and logout Unauthorized access puts
enterprises at risk
From an IT perspective, passwords are notoriously insecure. From a user
perspective, passwords are annoying. For strong security and an enhanced
employee experience, take your workforce passwordless. Entrust has been
offering passwordless solutions for 7+ years, including: 80
• Mobile-derived PIV solutions

• Proximity workstation login of hacking related breaches


caused by compromised
• Passwordless SSO authentication credentials5

Unleash the power of passwordless login

• Secure • One-time user registration $6T/year


• Increased workforce productivity • Reduce TCO Global cybercrime
damages predicted to
• Unified access reach $6 trillion annually
in 20216

Key takeaway
Highly evolved security for your enterprise. Simplicity for your users.

WATCH TH E VI D EO 5. Verizon Data Breach Investigations Report, 2020


6. Herjavec Group Official Annual Cybercrime Report, 2019
10
Passwordless login

The challenge The solution


Lost, stolen, and damaged data. Financial theft. Hits to Taking your workforce passwordless creates a secure
productivity, intellectual property, business disruption, digital identity on the employee’s mobile phone using a
and reputations. The list of cybercrimes goes on ad PKI credential that is unlocked with biometric
infinitum. And amongst different cybercrimes, 80% of authentication, such as fingerprint or facial recognition.
breaches are a result of hacking credentials – typically This ensures that the credential holder is, in fact, the
passwords. credential owner, protecting workers’ digital identities
With cybercrime growing at an alarming rate, passwords and corporate assets. And, by replacing the password
create vulnerability for enterprises. Yet the average with a high-assurance passwordless solution, you are
employee uses 36 cloud services at work, and accessing also creating an effortless employee experience –
those applications requires multiple passwords. If especially when combined with SSO for cloud and
compromised, those passwords put you at risk of data on-prem apps, including legacy.
loss and unauthorized network access. Passwordless options for consumers include using
smartphone biometrics or FIDO tokens with BYODs.

CHOOSE ENTRUST IDENTITY AS A SERVICE FOR PASSWORDLESS LOGIN


• Happier users • Unified SSO
• Unburdened IT • Reduced TCO
• High assurance credential based • Flexible deployment options
• Proven • X.509, PIV, PIV-D, and FIDO2 compliant
11
Customer and partner portals
Digitally connect and collaborate

Enterprise stakeholders can often be forgotten in the drive to make IT work for
the team, but they’re the lifeblood of the organization, be they clients, customers,
suppliers, or contractors.

The first encounter a stakeholder has with the business might well be through
an authentication experience, which can set the tone of the relationship as it
develops.

Unleash the power of customer and partner portals


• One easy-to-manage credential for •E
 xpand relationships with customers
secure, flexible access and partners

• Transform your enterprise from • Integrate customers into your


customer-aware to customer-led innovation processes in real time

Key takeaway
Give external users access to the apps, information, and networks you choose.

LE AR N M O R E
12
Customer and partner portals

The challenge The solution


Never has the phrase, “the customer rules,” been more For organizations with external users that require a
important than it is today. Making an organization simple, low-cost solution that does not require mobile,
customer-led is crucial for success and profitability, and grid, and email can offer a pragmatic option.
in the digital space, that means frictionless identity Users enjoy flexible access through a wide range of
credentials. authentication choices – from OTP to hardware tokens
Reaching new markets, expanding existing relationships, and grid cards. But it goes further. The solutions for
and delivering competitive and excellent customer customers are scalable, as they grow in number and
experiences is also important, but those outcomes aren’t their needs and expectations evolve, so the
guaranteed. authentication infrastructure adapts to the new realities.
In fact, several high-profile breaches have originated
from weak partner credentials being stolen. Without an
authentication pathway that is frictionless, customers
and partners will associate a painful process with the
brand, driving decisions that will impact the business.
Enterprise IT managers need an authentication solution
that enables a customer-led business. Trusted
connections
CHOOSE ENTRUST IDENTITY AS A SERVICE FOR CUSTOMER AND PARTNER PORTALS allow my
•A  daptive authentication, such as device
fingerprint, device reputation, geo-location
• Wide range of authenticators to choose from
• Transparent, secure user experience
company
to thrive.
• Out-of-the-box onboarding tools • Mobile innovation
• User self-registration and management

13
Privileged users
Critical on-premises systems and apps Trusted identities ensure digital
business success
It’s tough at the top, and tougher still at the heart of the most sensitive IT
platforms in the enterprise. Keeping them safe and making sure the correct MORE THAN

7-IN-10 CEOs
identities are connected to them is one of the most crucial jobs an IT manager
has to navigate.
feel they are not fully
And admin accounts are often targeted as the ingress to much more corporate prepared for a cyber event7
data. It’s tempting to ramp up the complexity in authentication, but it’s also
putting the brakes on competitiveness, so what’s the solution?
UP TO
Unleash the power of privileged users
• Secure access for IT, anytime, • Frictionless user experience
anywhere
• Protection against evolving threats
40
• Trusted access for privileged users

• High-value transactions of all digital initiatives


will fail due to
mismanagement of
identity-related
requirements

Key takeaway
Strong authentication and trusted security for critical resources that sit inside
your firewall.

7. Hiscox Cyber Readiness Report, 2020


14
Privileged users

The challenge The solution


At the nerve center of the dynamic enterprise are Flexible, secure access and frictionless authentication is
systems, information, and platforms that only a few essential, making adaptive authentication key to
should have access to. High tech, government agencies, providing transparency and only enabling step-up
and finance departments all safeguard a range of authentication when the risk is elevated. With the ability
sensitive material, ranging from intellectual property to to tailor policies per user, the process is truly frictionless.
national security assets and market critical data. Even at the privileged level, solutions need to be scalable
Not just that, executive outcomes that can make or so they can stay the perfect fit for a rapidly developing
break the organization are enacted through systems enterprise.
where additional assurance is essential. As project- Certificate-based credentials have a vital role to play
specific contractors come and go, informational here – PKI, especially when combined with out-of-band
gatekeepers need to be confident that they are giving push authentication, can help protect against the most
access to the right people. But even at privileged user
levels, a frictionless experience is vital to ensure the
advanced attacks.
The solution can be configured and deployed with
Whether cloud
or on-premises,
smooth and competitive running of the enterprise.
speed, offering time-saving low-touch daily operation
and a unified UX across any device in any location.

I always have
trusted access.
CHOOSE ENTRUST IDENTITY AS A SERVICE FOR PRIVILEGED USERS
•  obile push
M •A  daptive authentication
• Dual approvals • Easy integration
• Mobile Smart Credentials • Unified authentication platform for cloud apps and
• BYOD and Mobile ID precheck on-premises assets

15
Entrust Identity as a Service

Ready to unleash the


full power of your
digital business?
VPN access Mobile Cloud SSO
FI N D O UT M O R E
Streamline remote access Unlock the power of mobile Seamless access to all apps
Work anytime, anywhere Frictionless user experience with Offer frictionless access while
with secure and simplified high levels of assurance, delivering providing strong protection
VPN access. increased productivity. against breaches. Experience Identity as a
Service with a completely
free 30 day trial.

START FR E E TR IAL

Passwordless Customer and Privileged


login partner portals users
Seamless and secure Digitally connect and Critical on-premises
login and logout collaborate systems and apps
Highly evolved security for Give external users access to Strong authentication and
your enterprise. Simplicity the apps, information, and trusted security for critical
for your users. networks you choose. resources that sit inside
your firewall.
16
ABOUT ENTRUST CORPORATION
For more information
Entrust keeps the world moving safely by enabling trusted identities, payments, and data protection. Today more
888.690.2424
+1 952 933 1223 than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase,
[email protected] accessing e-government services, or logging into corporate networks. Entrust offers an unmatched breadth of
digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500
entrust.com
colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s
most entrusted organizations trust us.

Learn more at
entrust.com Global Headquarters
Entrust and the Hexagon logo are trademarks, registered trademarks, and/or service marks of Entrust 1187 Park Place, Minneapolis, MN 55379
Corporation in the U.S. and/or other countries. All other brand or product names are the property of their respec- U.S. Toll-Free Phone: 888 690 2424
tive owners. Because we are continuously improving our products and services, Entrust Corporation reserves the International Phone: +1 952 933 1223
right to change specifications without prior notice. Entrust is an equal opportunity employer.
©2021 Entrust Corporation. All rights reserved. IA21Q3-entrust-identity-as-a-service-ebook-eb [email protected] entrust.com/contact

You might also like