Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:00 AM
Dark Reading
Dark Reading
Products and Releases

Entrust Datacard Integrates with Citrix Mobility Solution to Empower Mobile

Integration between Entrust IdentityGuard authentication and credential management capabilities with XenMobile enable secure anytime-anywhere productivity for the mobile workforce

MINNEAPOLIS, Minn.—(June 08, 2015)—Entrust Datacard announced it is working with Citrix, a leader in mobile workplaces, to drive productivity and enhance security for the rapidly growing mobile workforce. Entrust Datacard is debuting new integrations with XenMobile®, a comprehensive enterprise mobility management (EMM) solution developed by Citrix, to provide a trusted mobile identity to secure access to sensitive data and corporate information – truly enabling mobile as the new desktop.

The integrations combine the authentication and credential management strengths of Entrust IdentityGuard software with XenMobile’s business optimized mobile productivity apps to deliver secure and frictionless access for the mobile worker and ease the onboarding process for commercial and government organizations. 

“Employees want more flexibility including the ability to access organizational resources directly from their mobile devices,” said Josh Jabs, vice president of strategy at Entrust Datacard. “Organizations realize that enabling employees with seamless access to enterprise resources not only satisfies employee demand, but also improves productivity.  As such, businesses and IT service organizations know they need to build a strategy around enabling mobile as the primary computing environment. But, the challenge then becomes enabling this environment in a cost-effective and user-friendly manner, without sacrificing security.”

With the new integration, mobile workers will no longer need to manage multiple passwords and separate log-ins.  Instead, users can have a more simplified sign-on and a streamlined user experience. The integration transforms the mobile device into a universal mobile credential, creating a single-sign-on process that replaces multiple smart cards, one-time-passcodes, PINs and passwords.

This can all be done by leveraging enterprises’ existing and underlying architectures – including policies put into place by IT departments, as well as credentials that workers already use to access their PC desktop environment. This simplifies the process and minimizes operational costs, ultimately protecting investments. 

The Entrust IdentityGuard software secures mobile identities, application access and transactions with a range of embedded credentials, such as digital certificates and simplifies the mobile application deployment process by tying into current identity and access management infrastructure.  The solution also meets regulatory standards, including FIPS-201 and NIST 800-157, for the issuance of derived credentials. By controlling access to applications with authentication of both the mobile device and the user, organizations can confidently offer mobile access.

 The proliferation of devices and the mobility of today’s workforce are driving seismic change in the industry,” said Manoj Raisinghani, vice president of product marketing, Mobile Platforms group, Citrix. “The integration between Entrust Datacard and XenMobile will provide enhanced authentication and credential management capabilities to our customers, empowering them to improve security and flexibility, streamline processes, and enhance productivity while being mobile.”

As a Citrix Ready® partner, Entrust Datacard is joining other experts and thought leaders at the Citrix Mobility 2015 Conference this week in Washington D.C.; as well as participated at the recent Citrix Synergy 2015 – sharing insights and innovations and defining direction for the future of the mobile workspace.

 To learn more about Entrust Datacard’s mobile applications, please visit http://www.entrust.com/solutions/mobile/.

About Entrust Datacard

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Our solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. More than 2,000 Entrust Datacard employees serve customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...