Attacks/Breaches
2/25/2014
09:20 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Entrust Integrates 3M Cogent Biometric Technology Into Entrust IdentityGuard Software Authentication Platform

Collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations

DALLAS -- February 24, 2014 -- Biometric fingerprint authentication isn't just for smartphones. Entrust, Inc. and 3M Cogent are integrating biometric fingerprint authentication into the award-winning Entrust IdentityGuard software authentication platform.

This collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations. Entrust is embedding 3M&trade Cogent fingerprint capture and verification technology, which will be available to both new and current Entrust IdentityGuard customers.

"Entrust and 3M share the same standards and vision for authenticating identities," said Entrust President Dave Wagner. "Integrating proven 3M biometric authentication is another step in the platform's evolution -- a stride that continues our focus on properly protecting customer identities."

With an increasing need to deploy second-factor authentication to protect sensitive information, organizations must balance security and usability. Adding 3M Cogent's easy-to-use strong authentication capabilities to the Entrust IdentityGuard portfolio helps organizations to streamline secure access to both cloud and internal systems.

"Entrust and 3M have complementary offerings in the identity management marketplace -- from digital certificate management to identity document issuance solutions," said Teresa Wu, who manages the global biometric portfolio for 3M Cogent. "We will leverage our respective strengths and expertise to expand biometric capability within the Entrust IdentityGuard authentication platform to help customers deploy solutions that match their budget, users and security needs."

In the U.S., law enforcement agencies may deploy biometric fingerprint capabilities to satisfy the FBI's CJIS requirements for advanced authentication. This type of biometric authentication is ideal for organizations that require a combination of secure access to sensitive resources and proven user convenience.

Entrust's flagship authentication solution, Entrust IdentityGuard, is one of the industry's most robust authentication and identity-assurance platforms. The platform offers one of the widest ranges of authenticators on the market -- and all from a single, cost-effective platform. And the addition of smartcards, mobile smart credentials and digital certificates as proven authenticators extends the platform's versatility, scalability and cost-effectiveness.

For more information about the Entrust IdentityGuard solution, visit www.entrust.com.

About Entrust

A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust's award-winning software authentication platforms manage today's most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.

About 3M Identity Management

3M and 3M Cogent deliver end-to-end, innovative security solutions to businesses and governments worldwide--helping to ensure the security of people and documents. With an unmatched mix of leading technologies in biometrics and credentialing as well as expert systems integration and support, 3M helps solve an array of security challenges, including efficient border management, secure issuance and authentication of civil IDs, and controlling access to facilities and information. 3M identity management technologies are used in over 100 countries around the world. For more information visit www.3m.com/identitymanagement.

About 3M

3M captures the spark of new ideas and transforms them into thousands of ingenious products. Our culture of creative collaboration inspires powerful technologies that make life better. 3M is the innovation company that never stops inventing. With $31 billion in sales, 3M employs 89,000 people worldwide and has operations in more than 70 countries. For more information, visit www.3M.com or follow @3MNews on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant