Cloud

12/4/2017
12:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Entrust Datacard Acquires Trustis Limited

Acquisition provides Entrust Datacard with expanded regional capability to address identity and personal data protection and regulations

MINNEAPOLIS -- Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced that it has acquired Trustis Limited, a specialized managed service provider of public key infrastructure (PKI) and crypto management solutions based in Thatcham, United Kingdom (UK). The acquisition further establishes Entrust Datacard as a leader of certificate-based security solutions and allows the company to expand its localized presence in Europe.

Trustis has already established itself as a UK leader in cloud cryptographic services and will be a strong complement to our portfolio,” said Todd Wilkinson, CEO, Entrust Datacard. “The addition of the Trustis team and managed PKI capabilities bolsters our regional presence, brings additional expertise to a strong team and demonstrates our commitment to leadership during a critical time for the PKI industry.”

As new security challenges arise in the age of Digital Transformation and the Internet of Things (IoT), such as industry regulations like eIDAS (electronic Identification, Authentication and Trust Services), the need to trust increasingly connected systems combined with a growing shortage of cybersecurity skills means this acquisition positions both companies to better serve their customers. Trustis maintains European Telecommunications Standards Institute (ETSI) and tScheme certifications demonstrating their understanding of the unique requirements necessary to operate under the current regulatory landscape in the region.

“The acquisition of Trustis by Entrust Datacard will benefit the broader PKI market as well as Trustis customers,” said Chris Swinbank, managing director of Trustis. “We’re excited to be a part of Entrust Datacard’s growth story.” Swinbank continued, “We’re proud of our success as a leader in PKI and cryptographic services and look forward to enjoying even greater success as a result of joining Entrust Datacard. The additional investment in our PKI products and services and access to some of the best resources in the field of PKI will expand our success geographically.”

Entrust Datacard has a long history of continually innovating to provide solutions that reflect changing market conditions. To extend its reach, the company has also pursued acquisition opportunities that extend its core offerings either geographically or technologically. As an established certificate-security leader in the UK, Trustis was a natural fit into the company’s acquisition strategy and will be a strong complement to the Entrust Datacard portfolio of solutions. In addition to strengthening its portfolio, Trustis’ ETSI and tScheme certifications bolster Entrust Datacard’s support and commitment to industry standards and ongoing changes to the regulatory environment.

The acquisition was signed and finalized on Nov. 28, 2017 for an undisclosed amount.

For more information about Entrust Datacard’s certificate-based security solutions, visit https://entrustdatacard.com/products/categories/pki

 

About Entrust Datacard Corporation

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com.

 

About Trustis

Trustis specialises in PKI and Cryptography, providing secure managed and cloud services from UK locations. The company focuses on providing compliant cryptographic services for governments and commercial entities. Rigorous security is Trustis’ day-to-day business and the organisation has an enviable reputation in the design, build and operation of high-assurance solutions.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...
CVE-2018-1841
PUBLISHED: 2018-11-19
IBM Cloud Private 2.1.0 could allow a local user to obtain the CA Private Key due to it being world readable in boot/master node. IBM X-Force ID: 150901.
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.