Featured

Secure Privileged Actions With an Identity-Centric Security Solution
Rajan Barara | Sr. Director of Product Management | Entrust and Rohan Ramesh | Director of Product Marketing | Entrust
Gartner® has named Entrust a Challenger for the 2nd consecutive year, making it one of the 10 vendors recognized in the Magic Quadrant™ for Access Management report. In addition, Entrust was also named a Leader in the 2024 Gartner Magic Quadrant for Identity Verification.
With the evolution of AI and availability of dark web services such as phishing as a service, attackers have a robust set of tools to compromise user identities that extend beyond just authentication. Entrust’s AI-powered, identity-centric security solution helps organizations secure the full identity lifecycle – from onboarding to authentication and authorization – while fighting fraud and account takeover (ATO) attacks.
Join this webinar to:
• Understand how you can enable a seamless and secure onboarding experience that can protect against fraud and deepfake attacks
• Secure privileged actions and high-value transactions with AI-driven biometrics and adaptive risk-based authentication
• Get insights on how to build an identity-centric security strategy that combines IAM, PKI, digital signatures, and identity verification
Gartner, Magic Quadrant for Access Management, Brian Guthrie, Nathan Harris, Abhyuday Data, Josh Murphy, 2 December 2024
Gartner, Magic Quadrant for Identity Verification, Akif Khan, James Hoover, Nayara Sangiorgio, 21 October 2024
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.
All episodes
-
Deconstructing Recent Identity-Related Breaches
Rohan Ramesh - Director of Product Marketing, Entrust
Most recent breaches have a common thread: They start with an identity-based attack as the initial vector. In fact, credential compromise and phishing are two of the most common initial attack vectors among breaches. With the acceleration of digital transformation, cloud adoption, and an increasingly hybrid workforce, the traditional network perimeter is no more. Identity (users, devices, applications) is the new perimeter.
In this webinar we’ll explore:
• A few of the recent identity-related breaches in the news along with the tactics, techniques, and procedures (TTPs) involved in these attacks
• How you can help protect your organization from attacks by defending against these TTPs
• Why you need to secure your existing identity provider (IDP) with high assurance phishing-resistant, MFA bypass-resistant authentication -
Common Identity-Based Attacks
Rohan Ramesh - Director of Product Marketing, Entrust
With the traditional perimeter disappearing and the acceleration of digital transformation and cloud adoption, identity has become the new perimeter. So it's no surprise that identity is the most attacked initial attack vector in recent cyber breaches
In this webinar we'll explore:
• Common identity-based cyberattacks
• Ways to defend against these types of attacks
• How an identity-centric approach to data security is crucial in building a proactive defense against cyberattacks -
Securing Workforce Identities in the Digital Age
Abubakar Asif, Product Marketing Manager, Entrust | Charlotte Pommier, Sr. Product Marketing Manager, Entrust
In an era of escalating cyber threats with identity being the most attacked vector, securing your organization's resources has never been more critical.
Explore the dynamic digital landscape and the evolving challenges of cybersecurity in our Workforce Identity webinar.
We'll cover key priorities such as combating phishing and deepfakes, securing data, and the significance of solutions for digital onboarding, identity verification, and simplified identity management.
Discover the benefits of phishing-resistant passwordless MFA, risk-based authentication, and biometrics verification.
Highlights include:
• The impact of digital transformation on cybersecurity
• The rise of phishing and deepfake threats
• Entrust Workforce solutions for comprehensive identity securityJoin us to learn how Entrust's Workforce Identity solution can empower your organization to navigate and thrive in a complex cybersecurity landscape.
Watch our webinar today and take the first step toward a more secure and efficient digital future.
-
Extend Your CIAM Strategy With Remote IDV and Signing
Charlotte Pommier, Sr. Product Marketing Manager at Entrust
With customer services becoming more digital-focused, and some now completely digital, current CIAM strategies may not be enough to manage your full suite of identification information. It’s time to rethink and extend your CIAM strategies to successfully manage the digital customer interactions you face – not just authentication. Our CIAM experts can help you do just that.
In this webinar, we’ll present three extended scenarios that require a high level of data integration and control between IAM, IDV and signing services:
• ID proofing
• High-risk transactions (e.g. password reset, address change, etc.)
• Approvals and agreement signingYou will discover how an integrated approach to these use-cases can:
• Speed up onboarding
• Increase customer confidence and loyalty
• Reduce online threats such as document fraud, account takeovers, deepfakes, and phishingTake the next step in your customer identity and access management journey by joining the discussion.
-
Securing the Future - Navigating Workforce and Customer Identity Challenges
Deepali Sathe, Analyst from Frost and Sullivan & Abubakar Asif, Product Marketing Manager with Entrust
Securing both workforce and customer identities has become more critical than ever before. Join industry experts from Frost & Sullivan and Entrust as we explore the evolving challenges of Identity and Access Management (IAM) and the distinct needs of both workforce and customer identities.
This webinar will delve into what companies should prioritize to stay secure in a complex threat environment. Through real-world use cases, we'll demonstrate the benefits and outcomes of adopting a robust IAM strategy that addresses both workforce and customer needs.
Don't miss this opportunity to gain valuable insights and strategies to fortify your IAM approach.
-
How to Effectively Implement Customer e-Signature Workflows (Including eIDAS-Qualified)
Charlotte Pommier, Product Marketing Manager with Entrust
E-signatures have become a cornerstone of online business, with the vast majority of customer onboardings and transactions having a form or agreement to sign.
Contrary to traditional paper-based signatures, there can be multiple ways to create e-signatures, and there are different standards across the globe.
In this webinar, we’ll focus on e-signature processes for customers:
• The different types of e-signatures
• How customer signatures differ from employee signatures
• The relationship between e-signatures and digital identities, and how this can be leveraged for e-signing workflows
• Examples of customer e-signatures with EntrustWhether you’re new to e-signatures or looking to enhance your current processes, this webinar will help you understand how to implement them effectively within your organization.
-
Shaping the Future of CIAM With AI-Powered Innovation
Abubakar Asif, Product Marketing Manager
Securing consumer identities is no longer just a responsibility – it’s a competitive advantage. Join us to discover how Entrust is transforming identity security with innovative solutions that combine AI-driven biometric verification, adaptive step-up authentication, and seamless integration.
In this webinar, we will dive into how businesses can enhance customer experiences while staying ahead of emerging threats. With capabilities like low-code orchestration, advanced fraud detection, and end-to-end AI-powered identity verification for digital onboarding, Entrust empowers organizations to secure every step of the customer journey.Learn how leading organizations are reducing fraud, meeting regulatory demands, and delivering frictionless digital experiences, all while safeguarding consumer trust.
Don’t miss the chance to see how Entrust’s solutions can help your organization build a more secure, seamless, and scalable future.
-
Secure Privileged Actions With an Identity-Centric Security Solution
Rajan Barara | Sr. Director of Product Management | Entrust and Rohan Ramesh | Director of Product Marketing | Entrust
Gartner® has named Entrust a Challenger for the 2nd consecutive year, making it one of the 10 vendors recognized in the Magic Quadrant™ for Access Management report. In addition, Entrust was also named a Leader in the 2024 Gartner Magic Quadrant for Identity Verification.
With the evolution of AI and availability of dark web services such as phishing as a service, attackers have a robust set of tools to compromise user identities that extend beyond just authentication. Entrust’s AI-powered, identity-centric security solution helps organizations secure the full identity lifecycle – from onboarding to authentication and authorization – while fighting fraud and account takeover (ATO) attacks.
Join this webinar to:
• Understand how you can enable a seamless and secure onboarding experience that can protect against fraud and deepfake attacks
• Secure privileged actions and high-value transactions with AI-driven biometrics and adaptive risk-based authentication
• Get insights on how to build an identity-centric security strategy that combines IAM, PKI, digital signatures, and identity verificationGartner, Magic Quadrant for Access Management, Brian Guthrie, Nathan Harris, Abhyuday Data, Josh Murphy, 2 December 2024
Gartner, Magic Quadrant for Identity Verification, Akif Khan, James Hoover, Nayara Sangiorgio, 21 October 2024
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.