Risks of Doing Business Online by yiq12320

VIEWS: 31 PAGES: 15

More Info
									Entrust, Inc.
Securing Your Enterprise Desktop
September, 2001
Securing Your Enterprise Desktop


Table of Contents
Executive Summary ............................................................................................. 2
Introduction – The need to secure enterprise assets ........................................... 3
  Identification ...................................................................................................... 3
  Entitlements ...................................................................................................... 3
  Verification ........................................................................................................ 3
  Privacy .............................................................................................................. 4
Enhanced Security for the Enterprise................................................................... 5
  What is Basic Internet Security? ....................................................................... 5
  The Need for Enhanced Internet Security ......................................................... 6
  Identification ...................................................................................................... 6
  Entitlements ...................................................................................................... 6
  Verification ........................................................................................................ 6
  Privacy .............................................................................................................. 6
  Security Management ....................................................................................... 6
Entrust for Enhanced Enterprise Desktop Security .............................................. 7
Securing Enterprise Applications ......................................................................... 7
  E-mail Communications .................................................................................... 7
  How the Secure E-mail Solution works ............................................................. 8
  Information Security .......................................................................................... 9
  Web Security................................................................................................... 10
  How the Secure Web Solution Works ............................................................. 11
  Business Process Security.............................................................................. 11
  How the Business Process Solution Works..................................................... 12
Deploying an Enterprise Security Solution ......................................................... 13
Providing Your Organization the Freedom to Move Internal Processes Online.. 14




September 20,2001                                                                                                Page 1
Securing Your Enterprise Desktop


Executive Summary
Empowering employees to work, communicate, and use products and services online is
unquestionably strategic. Of even more strategic value are the plans, negotiations, and personnel
details that get channeled through various online programs. What good is process efficiency if it
exposes valuable company details and assets to the wrong people?

        According to the Computer Security Institute (CSI), the average insider attack
        costs the enterprise $2.7 million. And the number of these attacks has increased
        41 percent since 1999 according to InfoSecurity magazine.

Entrust’s Enterprise Desktop Solutions can help to alleviate these concerns so business
efficiencies may be achieved and freedom of communications may be realized. When these
solutions deliver enhanced security to new and existing applications – e-mail, Intranet, an ERP
system – an enterprise can then protect itself, its employees and partners, and the information
that pass between its virtual walls.
Securing Your Enterprise Desktop




Introduction – The need to secure enterprise assets
Many businesses are structuring new services, enhanced applications, and better business
processes – for employees, partners, and customers – around the Internet. This has become a
fundamental aspect of business since there are obvious business and financial opportunities such
as:

    •   saving communication costs, travel, and traditional paper-based processes
    •   delivering enhanced security services to increasing amounts of mobile workers;
    •   maximizing new levels of electronic transactions and trade.

But what might not be as obvious, is that the real opportunities and savings are realized when
these services are used for more than online customer service requests, retail purchases, and
auction bids. When services can handle high volumes of sensitive and valuable transactions –
like accessing financial or health records or securing a million dollar loan – the opportunities
extend beyond savings to include gains in: a) market share; b) employee and customer
satisfaction and loyalty; and c) corporate brand equity.

Transactions that are sensitive and high-value however, significantly raise the bar for electronic
security. Despite the speed, convenience and reach of the Internet, it is not without some inherent
risks. Doing business online is vastly different than doing business in person, or even on the
phone, and systems that foster the same degree of confidence are required. People need to be
able to verify that they are dealing with who they think they are, that a transaction in fact was
completed, that confidential information was not compromised during the process, and that the
records of the process are able to be demonstrated.

Because these needs are not often met by Internet and Enterprise Desktop applications, serious
problems arise in the following areas:

Identification
Because the Internet doesn’t have the same safeguards as traditional business interactions – a
face-to-face contact, recognition of a familiar voice – it’s hard to be certain that you are dealing
with the organization or person you think you are. People on the Internet have a great deal more
anonymity than they do in traditional interactions.

        According to a Hurwitz Group, Inc. report, the online world significantly reduces our ability
        to evaluate identities, resulting in an increase in identity fraud, with over 25,000 incidents
        in the U.S. last year alone.

Entitlements
For business transactions, it is important to not only identify the person you are doing business
with, but to confirm that they are authorized to carry out a specific transaction. For instance, you
need to be able to verify that the person is entitled to access specific information based on user
privileges. If you cannot prevent them from completing a transaction for $200,000 when their
authorized level is $20,000, or protect the most highly confidential documents from employees
who are not authorized to view them, then online efforts will be in jeopardy.

Verification
To complete many Enterprise transactions – like signing an expense form, or signing a bank loan
– it is your physical presence and your handwritten signature that make this binding. Without the
proper security measures in place, achieving this same degree of transaction verification online
can be extremely difficult.
Securing Your Enterprise Desktop



Privacy
Printed documents, contracts, and personal records can be protected using physical security
measures. But documents on a computer or server are vulnerable to interception, and alteration,
– especially with the increasing prevalence of laptops theft. And because these documents could
contain intellectual property or strategic plans, having them fall into the wrong hands could have
serious consequences for an organization.

        According to the Computer Security Institute (CSI), the average insider attack costs the
        enterprise some $2.7 million, compared with $57,000 for the average outside attack.
        InfoSecurity magazine indicates that the number of companies with insiders who stole,
        sabotaged or intentionally disclosed proprietary data increased by 41 percent over 1999,
        while those reporting the physical theft of equipment nearly doubled causing those with
        proprietary information being stored on their laptops to be concerned.


These enterprise security issues have become well known and highly publicized. Thus, affected
organizations pay both the direct costs, but many indirect costs associated with the loss of trust in
the organization, which results in lower brand equity and an organization’s ability to proactively
protect its infrastructure. In the case of organizations like government departments and financial
institutions where the public’s perception of them is critical to their success, this assault on
reputation and brand can be crippling.
Securing Your Enterprise Desktop




Enhanced Security for the Enterprise
While many examples of online business communications and transactions already exist, in the
rush to get these services up to take advantage of the rise of the Internet, many of them offer only
basic security measures. Although basic security can be sufficient for lower value transactions
and for the exchange of less sensitive information, organizations recognize that to secure their
internal information from unlawful intrusion, organizations need to deploy enhanced security.
However, in order to determine what type of security your organization requires, it is always good
to consider what each type of security provides.

What is Basic Internet Security?

Business services on the Internet range from information publishing, to basic e-commerce sites
offering services such as retail purchasing (i.e. books and CDs), to submission of travel profile
data. These applications have typically been secured using Secure Sockets Layer (SSL) for
information privacy between the Web browser and Web server and UserID/Password for user
identification.

Basic Internet Security Provisions
For the user, SSL provides a basic level of confidence that the user is communicating with the
Web site that they intend to be dealing with. SSL also encrypts the transaction information from
the user’s Web browser to the Web server. However, what happens with their transaction
information after it gets to the Web server is less certain. More often than not, this data (i.e. credit
card number, or personal information) is left on the Web server un-encrypted, in human readable
form.

From the enterprise, or Web site’s perspective, basic Internet security in the form of SSL and
UserID/Password can provide a rudimentary level of identification of who a user may be dealing
with, as well as basic entitlements, or access control to grant or deny access to certain Web site
resources.

Basic Internet Security Omissions
With basic security, users may not have:
• the confidence that their information is private beyond the site’s Web server – when it is
    stored or moves within the enterprise
• strong, auditable verification of the transaction between the employee and the enterprise, or
    business partner
• transparent and automatic management of their digital ID or entitlement credentials – they
    are required to manage these themselves.

For the enterprise, basic Internet security does not provide:
• strong verification of people’s identities
• privacy of information as it moves within the enterprise
• organizations with the ability to control access to enterprise resources
• records of the transaction between the enterprise and the employee
• automatic security management of user identity and entitlements across multiple applications
    or platforms.
Securing Your Enterprise Desktop


The Need for Enhanced Internet Security

For strategic enterprise implementations it is essential to create a framework that is conducive to
permitting high value transactions and highly sensitive communications to travel over the Internet
without compromise. Examples of strategic enterprise implementations include online banking
and brokerage, cash management, tax filing, government procurement, medical information
submission, HR information, and expense for submission. For all of these, action to prevent the
problems outlined in the Introduction section of this paper must be taken.

The fundamental requirements for enhanced Internet security draw upon the complete spectrum
of a transaction lifecycle. These include identification, entitlements, verification, privacy, and
security management.


Identification
It is important to know who is at either end of a transaction or information exchange on the
Internet. If individuals are not confident of someone’s identity, they risk disclosing information to
unauthorized individuals. A strong level of identification can be achieved by utilizing trusted
identification credentials such as digital IDs.


Entitlements
Often there is a need to grant or deny access to particular Web resources or applications based
on who is interacting with the application and/or what role they fill. For example, an organization
may want varying levels of access and resources granted to customers, employees, and
business partners. They may also want to vary entitlements within those groups. The risk of not
implementing an enhanced entitlements system is the disclosure of information to unauthorized
individuals. Without advanced control of entitlements, organizations cannot move forward with
many advanced applications and networking solutions.


Verification
In order for a transaction to be considered binding between parties, there needs to be a strong
auditable record of the transaction so that neither party can repudiate it. This can be
accomplished using digital signatures and digital receipts, which are now becoming recognized
as binding in many jurisdictions.


Privacy
Sensitivity of personal or corporate information is paramount to higher value and higher sensitivity
online transactions and information sharing. Privacy entails keeping the data from prying eyes,
and maintaining confidentiality while in transit and in storage. Information needs to be secured
end-to-end of the transaction lifecycle or information exchange. It should also be noted that
privacy also constitutes the policy surrounding the use and disclosure of this information within
the enterprise. The risk of not implementing enhanced privacy can sometimes be the most
significant issue, certainly in terms of public perception resulting in loss of trust and brand equity.


Security Management
Security management refers to the ability to manage the above requirements effectively and
efficiently so that there is less burden of administration for both the end users and the
Securing Your Enterprise Desktop


administrators, regardless of application or platform. Automated and transparent security
management results in a lower cost of ownership of maintaining the system overall.

As organizations look to gain competitive advantage by improving their products and services,
technology related to digital signatures and security of information is an attractive option. In the
past few years, enhanced security has been referred to technically as public-key infrastructure
(PKI) and has become the preferred means for providing stronger levels of identification, privacy,
verification and security management capabilities.


Entrust for Enhanced Enterprise Desktop Security
Entrust, a leading global provider of Internet security solutions, provides enterprises with these
five fundamental requirements for enhanced Internet security within the Enterprise Desktop
Environment. The Enterprise Desktop Solution enables internal processes to be moved online
securely by providing the identification, verification, entitlements, privacy and security
management services through one central interface. This is accomplished through the following
four solutions:

E-mail Solution: Secures e-mail communications throughout the enterprise and with selected
external parties.

File Solution: Protects corporate files and folders to help prevent them from being reviewed,
tampered, or stolen by outsiders and unauthorized personnel.

Web Solution: Secures Web-based services that are delivered to employees through the
enterprise Intranet.

Business Process Solution: Secures processes – like ERP or CRM – that are enabled by other
third-party products that the enterprise has invested in.


Securing Enterprise Applications

E-mail Communications
E-mail is convenient and inexpensive, but not without some inherent risks. When unprotected, e-
mail messages can be opened, forwarded or tampered with by unauthorized people. And
because e-mails don’t have the same reassurances as conventional communications – by way of
a handwritten signature, or bonded delivery – sometimes the intent and contents can be disputed,
or denied, to the organization’s detriment.

This is precisely why more and more organizations are implementing policies that govern the use,
confidentiality, accountability, and verification of e-mail communications. These organizations are
exploring ways to exploit e-mail, while being sensible about the complimentary measures that go
hand-in-hand with its widespread use.

Entrust is uniquely positioned to help these and other organizations turn popular e-mail software
programs into secure and more reliable communication vehicles. Its specialized enhanced
security enables encryption and digital signature technology, and allows the enterprise and its
employees to:
Securing Your Enterprise Desktop


•   Identify the sender and receiver of e-mail communications
•   Use the freedom of communications in a protected environment, with the confidence that
    information contained in e-mail message will not be tampered with
•   Keep message contents private and confidential – even when e-mail isn’t in use
•   Verify the intent and content of a message

And, because the Entrust solution is centrally managed and automated through Entrust
Entelligenceä Desktop Manager and Entrust Authorityä Security Manager, an organization can:

•   Enforce e-mail security rules and policies throughout the user base
•   Interoperate with policy based e-mail content scanning devices
•   Issue and maintain the invisible digital identities needed for proper identification of e-mail
    users – in a way that is less onerous on the IT team or the users themselves
•   Leverage the same technology and security across other processes, if desired

With Entrust’s E-mail Solution, enterprises can depend upon e-mail packages like Microsoft®
Exchange™ and Microsoft Outlook™, and, Lotus® Notes™ for important business
communications and negotiations. With its transparent security measures, Entrust products can
help organizations make e-mail communications as reliable as phone, couriers, or face-to-face
meetings – allowing enterprises to make more timely, cost-effective e-mail communications an
integral part of their improved business processes.



How the Secure E-mail Solution works

Entrust Entelligenceä Desktop Manager operates on users desktops so that they can securely
log in once to their e-mail solution, and any other applications that are secured by Entrust
products. Entrust Entelligence manages users’ digital IDs, and enables encryption, digital
signatures and other security features.

The E-mail Plug-in is also installed on user’s computers to allow programs like Microsoft®
Exchange™, Microsoft Outlook™, and Lotus® Notes™ to take advantage of security services
that are enabled by Entrust Authorityä Security Manager and Entrust Entelligenceä Desktop
Manager.

Within the company’s IT infrastructure, the Security Manager provides enhanced security
management by enabling identification, entitlements, verification and privacy. It also provides
security management to enable delivery of these capabilities to the e-mail program in a
consistent, transparent and automated way. Entrust Authority enables this through:

•   Issuance and lifecycle management of digital IDs for use across multiple applications and
    various Internet security operations
•   Definition and enforcement of an organization's security policy
•   Automation of the administration of users and the application of security policy

For enterprises that have a large and mobile work force, they can add the optional components-
Roaming Server and Self-Administration Server on the infrastructure side. The Roaming Server
helps enterprises whose employees are mobile and need to work from any workstation and any
location. The Self-Administration Server helps large enterprises deploy security by allowing users
the flexibility to self-register for their digital IDs over the Web.
Securing Your Enterprise Desktop



Information Security
Paper documents are vulnerable to all kinds of interception when they lay on printers, faxes,
desks, or even in closed offices and locked filing cabinets. Electronic creation, storage, and
sharing of documents is much more efficient. But enterprise computers can be accessed by
unauthorized people, and especially in the case of laptops, easily stolen or lost.

    FBI Reports laptops missing
    Hundreds of FBI laptop computers, including at least one containing classified information,
    have been lost or stolen…The Justice Department acknowledged July 17 that hundreds of
    laptop computers and weapons were lost, missing or stolen. Internal security is a paramount
    concern, officials said.
    - July 20, 2001, Federal Computer Week, online

This is precisely why more and more organizations – including government departments and
financial institutions who want to conduct sensitive business electronically – are investigating
enhanced security for the protection of files and folders that reside on their organizations
electronic devices.

Entrust is uniquely positioned to help these and other organizations turn computer hard drives
and networks into secure information storage mediums. Its specialized encryption and digital
signature technology allows the enterprise and its employees to:

•   Store information in an encrypted fashion until it is needed again
•   Encrypt documents for a select group of individuals who are approved to view the contents
•   Digitally sign online documents – digital signatures are being recognized in many jurisdictions
    as an alternative to handwritten signatures
•   Delete documents of a secure nature with confidence that temporary copies that may be
    cached will be eliminated as well
•   Set certain documents or folders to automatically encrypt, removing responsibility from the
    user or administrator to remember to encrypt each time

And because the Entrust solution is centrally managed and automated through the Entrust
Entelligenceä Desktop Manager and Entrust Authorityä Security Manager, the organization can:

•   Enforce document security policies efficiently throughout the user base
•   Access intellectual property that was encrypted by an employee that is no longer at the
    organization
•   Issue and maintain the invisible digital identities needed for proper identification of people
    accessing secured documents – in a way that is not onerous on the IT team or the users
    themselves
•   Leverage the same technology to secure other processes, if desired

With Entrust’s File Solution, organizations can encrypt documents that contain sensitive corporate
information. With its transparent security measures, Entrust can make file security even more
reliable than our previous paper-based processes.


How the Secure File Solution works
Securing Your Enterprise Desktop


Entrust Entelligence Desktop Manager operates on users desktops so that they can securely log
in once to use file security services, and any other applications that are secured by Entrust. The
Desktop Manager manages their digital ID, and enables encryption, digital signatures and other
security features for the user.

The File Plug-in is also installed on user’s computers to allow them to encrypt, decrypt, and
digitally sign documents that they are working on alone, or with an authorized group.

Within the company’s IT infrastructure, Entrust Authority enables identification, entitlements,
verification and privacy. It also provides security management to enable delivery of these
capabilities to files they are working on in a consistent, transparent and automated way. Entrust
Authority enables this through:

•   Issuance and lifecycle management of digital IDs for use across multiple applications and
    various Internet security operations
•   Definition and enforcement of an organization's security policy
•   Automation of the administration of users and the application of security policy

For enterprises that have a large and mobile work force, they can add the optional components
Roaming Server and Self-Administration Server on the infrastructure side. The Roaming Server
helps enterprises whose employees are mobile and need to work from any workstation in
different locations. The Self-Administration Server helps large enterprises deploy security by
allowing users to self-register for their digital IDs over the Web.

Web Security

Today’s enterprises operate out of many branch offices that span the globe – making traditional
methods of information distribution costly and time consuming. Voice mail systems can be used,
but are expensive, they don’t scale well, and as a way of relaying company-wide messages –
would become intrusive with overuse. And as for Web-based services, they are convenient and
inexpensive, but have inherent risks when confidential information is transferred over the network.

These realities illustrate why many organizations are opting to implement Intranets that offer
employee self-service to information and resources. Some initial and ongoing implementations of
corporate Intranets are poorly optimized – they only provide access to low sensitivity and low
value information like white papers, company directories, and other publicly available information.
With better security options, many organizations are providing access to personnel records,
financial approvals, and health program updates while being sensible about the complimentary
security measures that must be present to allow their success and wide-spread use.

Entrust is uniquely positioned to help these and other organizations turn poorly optimized
Intranets, into secure hubs for important employee information and employee self-services. Its
specialized encryption and digital signature technology allows the enterprise and its employees
to:

•   Authenticate the person logging in to Web applications
•   Maintain information that is presented on a corporate Intranet, or data that is transmitted
    through a Web service, confidential and private – even when the information isn’t in use
•   Use entitlements to dictate different levels of authorized access to different people
•   Complete transactions with an auditable record over the Web
•   Verify transactions that were made over the Web
Securing Your Enterprise Desktop


And because the Entrust solution is centrally managed and automated through the Entrust
Entelligenceä Desktop Manager and Entrust Authorityä Security Manager, the organization can:

•   Enforce certain Intranet rules or policies throughout the user base
•   Issue and maintain the invisible digital IDs needed for the identification of users of the
    Intranet – in a way that is not onerous on the IT team or the users themselves
•   Leverage the same technology to secure other processes they commonly use, if desired

With Entrust’s Secure Web Solution, enterprises can more confidently depend upon their Intranet
or Web applications for important business communications and negotiations. With its transparent
security measures, Entrust products can make Web transactions as reliable as phone, signed
memos, couriers, or face-to-face interactions – allowing enterprises to make more timely, cost-
effective communications an integral part of their improved business processes.



How the Secure Web Solution Works

Entrust Entelligence Desktop Manager operates on users desktops so that they can securely log
in once to use Web security services, and any other applications that are secured by Entrust. The
Desktop Manager manages their digital ID, and enables encryption, digital signatures and other
security features for the user.

The Web Plug-in is also installed on user’s computers to allow them to take advantage of security
services that are enabled by Entrust Authority and Entrust Entelligence when they use Web
applications or the Intranet.

Within the company’s IT infrastructure, Entrust Authority Security Manager enables identification,
entitlements, verification and privacy. It also provides security management to enable delivery of
these capabilities to the Intranet in a consistent, transparent and automated way. The Security
Manager enables this through:

•   Issuance and lifecycle management of digital IDs for use across multiple applications and
    various Internet security operations
•   Definition and enforcement of an organization's security policy
•   Automation of the administration of users and the application of security policy

For enterprises that have a large and mobile work force, they can add the optional components
Roaming Server and Self-Administration Server on the infrastructure side. The Roaming Server
helps enterprises whose employees must be able to work from various workstations by issuing
more than one user a secure means of using the system from that location. The Self-
Administration Server helps large enterprises deploy security by allowing users the flexibility to
self-register for their digital IDs over the Web.


Business Process Security
Many solutions designed to help companies achieve new efficiencies in production, relationship
management, and planning, have tremendous potential to increase employee efficiencies and
decrease the reliance on cumbersome paper-based processes. In fact, in some departments,
approval processes can take up to months due to paper-based processes. In order to compete
with other companies, speed to market is critical and waiting behind paper processes can be a
Securing Your Enterprise Desktop


competitive disadvantage. The business process solutions require significant investments –
investments that will only be returned once the company optimizes their use and functionality.
However, given that the information that passes over such systems are highly sensitive and
valuable, how can an organization protect themselves, it’s employees and partners, and
everything that passes through these processes?

Entrust is uniquely positioned to help organizations protect the information that passes through
business process applications that they’ve invested in or developed themselves. The Entrust
Enterprise Desktop Solution can easily integrate into many third-party solutions using the Entrust
Authorityä toolkits. These toolkits provide the functionality required for third-party applications to
take advantage of Entrust’s specialized encryption and digital signature technology. This allows
the enterprise and its employees to:

•   Authenticate the parties involved in a business process transaction
•   Maintain the information passing through Web-based processes private and confidential
•   Verify the intent and outcome of a transaction
•   Digitally sign transactions

And because the Entrust solution is centrally managed and automated through the Entrust
Entelligenceä Desktop Manager and Entrust Authorityä Security Manager, the organization can:

•   Enforce certain business process rules or policies throughout the user base
•   Issue and maintain the invisible digital IDs needed for proper identification people using an
    application – in a way that is not onerous on the IT team or the users themselves
•   Leverage the same technology to secure other processes


With Entrust’s Business Process Solution, enterprises can secure many common and strategic
applications. Entrust products can integrate with over 200 Entrust-Ready third-party products
manufactured by vendors such as: PeopleSoft, SAP, Adobe, Ariba, i2, Accelio (JetForm), Shana,
Tibco, and more. The Entrust enterprise desktop solution easily integrates into many partner
solutions using Entrust's Developer Suite of toolkits.


How the Business Process Solution Works

Entrust-Ready applications and third-party software use the Entrust Authorityä to integrate with
Entrust. Entrust solutions integrate easily into existing software vendor solutions with the toolkits
without impacting the existing infrastructure.

On the user’s desktops, Entrust Entelligenceä Desktop Manager allows them to login in once to
any applications that utilize the toolkits. The Desktop Manager manages their digital ID on their
behalf and allows them access and utilize enterprise programs securely.

Within the company’s IT infrastructure, the Security Manager enables identification, entitlements,
verification and privacy. It also provides security management to enable delivery of these
capabilities to the Intranet in a consistent, transparent and automated way. The Security Manager
enables this through:

•   Issuance and lifecycle management of digital IDs for use across multiple applications and
    various Internet security operations
•   Definition and enforcement of an organization's security policy
•   Automation of the administration of users and the application of security policy
Securing Your Enterprise Desktop



For enterprises that have a large and mobile work force, they can add the optional components
Roaming Server and Self-Administration Server on the infrastructure side. The Roaming Server
helps enterprises whose employees are mobile and need to work from any workstation in various
locations. The Self-Administration Server helps large enterprises deploy security by allowing
users the flexibility to self-register for their digital IDs over the Web.


Deploying an Enterprise Security Solution
The IT departments of many large enterprises already have the experience and expertise needed
to install and set up an Entrust solution. However, if time or resources dictate, Entrust’s
Professional Services Team or any of the large system integrators Entrust has established
relationships with can install the system at a customer’s site.

Other professional services that are available to help customers include:
• Internet Security Consulting
• Deployment Services
• Systems Integration Services & Custom Application Development
• Insource Programs
• Training

Once the system is installed and set up, Entrust solutions offer an easier process to enroll users
for the system so that secure e-mail, Web, file and other business processes can be rolled-out.
Securing Your Enterprise Desktop




Providing Your Organization the Freedom to Move Internal
Processes Online

Conclusion
Entrust’s Enterprise Desktop solutions enable organizations to move their business processes
online by providing identification, entitlements, verification, privacy and security management.
The Enterprise Desktop Solution accomplishes this through the use of two Entrust products:
Entrust Entelligence and Entrust Authority. These products provide encryption, digital signatures,
and other security services to the broadest range of enterprise applications – allowing enterprises
to make strategic use of the Internet for business. Entrust’s solutions can be used alone, or in
conjunction with other third-party products, to secure the enterprise e-mail system, the Intranet,
files and folders of important company information, and other business processes.

Entrust’s Enterprise Desktop Solutions are widely used by many government, and financial
organizations like USPTO, Perot Systems, Kaiser Permanent, New York Life and more. The
Entrust difference is that it protects the full transaction cycle; enterprises relieve themselves from
the issues that arise relating to identification, entitlements, verification and privacy. Plus, with a
system that provides unmatched security management, the implementation and deployment of
the solution places less effort and work on both the end users and the administrators, regardless
of application or platform. Automated and transparent security management can potentially result
in a lower cost of ownership for maintaining the system overall.

With this, the enterprise is equipped with applications that can handle high value, high sensitivity
transactions – like accessing financial or health records or securing a million dollar loan. They can
operate more efficiently knowing that they have protected themselves, their employees and
partners, and everything that passes between their virtual walls. This opens the door to
opportunities and freedom that extends well beyond actual savings, and may also include gains in
the market reach, employee and customer satisfaction, maintaining the enterprise’s brand equity
and enabling users to conduct secure and safe communications.

								
To top