Attacks/Breaches
2/25/2014
09:20 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Entrust Integrates 3M Cogent Biometric Technology Into Entrust IdentityGuard Software Authentication Platform

Collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations

DALLAS -- February 24, 2014 -- Biometric fingerprint authentication isn't just for smartphones. Entrust, Inc. and 3M Cogent are integrating biometric fingerprint authentication into the award-winning Entrust IdentityGuard software authentication platform.

This collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations. Entrust is embedding 3M&trade Cogent fingerprint capture and verification technology, which will be available to both new and current Entrust IdentityGuard customers.

"Entrust and 3M share the same standards and vision for authenticating identities," said Entrust President Dave Wagner. "Integrating proven 3M biometric authentication is another step in the platform's evolution -- a stride that continues our focus on properly protecting customer identities."

With an increasing need to deploy second-factor authentication to protect sensitive information, organizations must balance security and usability. Adding 3M Cogent's easy-to-use strong authentication capabilities to the Entrust IdentityGuard portfolio helps organizations to streamline secure access to both cloud and internal systems.

"Entrust and 3M have complementary offerings in the identity management marketplace -- from digital certificate management to identity document issuance solutions," said Teresa Wu, who manages the global biometric portfolio for 3M Cogent. "We will leverage our respective strengths and expertise to expand biometric capability within the Entrust IdentityGuard authentication platform to help customers deploy solutions that match their budget, users and security needs."

In the U.S., law enforcement agencies may deploy biometric fingerprint capabilities to satisfy the FBI's CJIS requirements for advanced authentication. This type of biometric authentication is ideal for organizations that require a combination of secure access to sensitive resources and proven user convenience.

Entrust's flagship authentication solution, Entrust IdentityGuard, is one of the industry's most robust authentication and identity-assurance platforms. The platform offers one of the widest ranges of authenticators on the market -- and all from a single, cost-effective platform. And the addition of smartcards, mobile smart credentials and digital certificates as proven authenticators extends the platform's versatility, scalability and cost-effectiveness.

For more information about the Entrust IdentityGuard solution, visit www.entrust.com.

About Entrust

A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust's award-winning software authentication platforms manage today's most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.

About 3M Identity Management

3M and 3M Cogent deliver end-to-end, innovative security solutions to businesses and governments worldwide--helping to ensure the security of people and documents. With an unmatched mix of leading technologies in biometrics and credentialing as well as expert systems integration and support, 3M helps solve an array of security challenges, including efficient border management, secure issuance and authentication of civil IDs, and controlling access to facilities and information. 3M identity management technologies are used in over 100 countries around the world. For more information visit www.3m.com/identitymanagement.

About 3M

3M captures the spark of new ideas and transforms them into thousands of ingenious products. Our culture of creative collaboration inspires powerful technologies that make life better. 3M is the innovation company that never stops inventing. With $31 billion in sales, 3M employs 89,000 people worldwide and has operations in more than 70 countries. For more information, visit www.3M.com or follow @3MNews on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7266
Published: 2015-02-01
Algorithmic complexity vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x through 3.1.2 allows remote attackers to cause a denial of service (CPU consumption) via vectors that trigger colliding hash-table keys. NOTE: this vulnerability exists because of an incomplete fix for CVE-2...

CVE-2014-7269
Published: 2015-02-01
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376....

CVE-2014-7270
Published: 2015-02-01
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earl...

CVE-2014-8630
Published: 2015-02-01
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shel...

CVE-2014-9200
Published: 2015-02-01
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X8...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.