Welcome!

Cognitive Computing Authors: Pat Romanski, Elizabeth White, Gregor Petri, ManageEngine IT Matters, Patrick Hubbard

News Feed Item

Tough, Tested and Certified - Entrust's PIV Smartcards Earn Pair of Trusted FIPS Certifications

Entrust's new certifications demonstrate interoperability, compatibility with strict NIST standards

DALLAS, Feb. 12, 2013 /PRNewswire/ -- Entrust Inc. finalized a pair of government approvals with FIPS 201 and FIPS 140 certifications for the company's PIV smartcard credential technology, which was reviewed, tested and certified by the National Institute of Standards and Technology (NIST).

These strict certifications demonstrate interoperability with established NIST standards, making them more reliable for governments, private organizations, banks or enterprises deploying security solutions in multivendor environments. To ensure a seamless deployment, many organizations will only purchase solutions that carry certain certifications.

"These certifications demonstrate Entrust's ongoing commitment to high security standards, particularly for large-scale identity authentication and credentialing interoperability," said Entrust President and CEO Bill Conner. "This achievement provides organizations across the world the assurances they need to deploy Entrust solutions and services with confidence and unwavering trust."

Based on strict standards set by the U.S. government, these certifications help ensure interoperability by vetting protocol conformance for smartcards (FIPS 201) and testing cryptography strengths (FIPS 140). These approvals complement and support Entrust's existing Common Criteria EAL 5 certification.

Reviewed by the NIST Personal Identity Verification (PIV) Platform Validation Authority, FIPS 201 certification focuses on interoperability between the PIV application and other parts of the PIV solution, including physical access readers and logical access clients. The strict certification also verifies the smartcard can withstand many years of rigorous wear and tear (e.g., being in a wallet or attached to a lanyard). To address the aspect of physical durability, Entrust relies upon advanced third-party antenna designs that support extended lifespans.

FIPS 140 certification ensures a given solution meets or exceeds U.S. government security standards that specify requirements for cryptography modules and physical tamper-resistance. An example includes testing the elliptic curve cryptography (ECC) implementation used within the solution.

The PIV standard outlines tested and approved systems that support a common smartcard-based platform for managing the identity, and then using that identity for digital signatures, encryption and authentication to multiple types of physical and logical access environments. Smartcards carry and manage the digital identity of the cardholder, protecting the theft of the identity through sophisticated hardware technology.

Entrust also includes additional extensions that enable a new level of customization and versatility within a private environment. Two of the more requested capabilities include PIN unblocking and the ability to execute over-the-air (OTA) tasks on mobile devices. All extensions are configurable and add convenience and customization unrivaled in the market.

"Entrust has long been committed to providing credentialing solutions that are compliant to the necessary PIV standards," said Conner. "Adding additional capabilities and conveniences, however, provides organizations unmatched versatility to achieve identity-based security standards that are a perfect match for their organization and overall goals."

Entrust has established relationships with a leading smartcard vendor to offer PIV credentialing solutions for state governments, private sectors and other non-federal organizations who need identity credentials that are issued in a manner that facilitates trust and technical interoperability with the U.S. federal PIV smartcard standard. Entrust smartcard solutions leverage the latest chip technology for fast, secure performance.

For upgrading organizations, Entrust incorporates advanced technology to allow for easy migration away from outdated legacy systems by simultaneously supporting old and new technology.

For additional convenience, Entrust also provides organizations a PIV-compatible credential that may be placed directly on mobile devices. Entrust's Mobile Smart Credential technology provides PIV authentication, encryption and digital signing without incurring typical deployment costs (e.g., card production and shipping). When the Entrust Mobile Smart Credential application is downloaded from the Apple, Google Play or BlackBerry application stores, and personalized with an identity, it is designed to mirror the behavior of a standard PIV smartcard.

Entrust is one of only a handful of PKI vendors approved to issue digital certificates for U.S. departments and agencies through the Shared Service Provider (SSP) and Federal Bridge CA programs. In addition, Entrust provides the digital certificates for all agencies who receive PIV credentials, from the General Services Administration (GSA), via the USAccess program.

Created by the U.S. NIST, the Federal Information Processing Standards (FIPS) outline general requirements for cryptographic modules within computer and telecommunication systems. A cryptographic module is defined as any combination of hardware, firmware or software that implements cryptographic functions such as encryption, decryption, digital signatures, authentication techniques and random-number generation.

An agency of the U.S. Department of Commerce, NIST is one of the nation's oldest physical science laboratories. Founded by Congress in 1901, the agency was established to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

Common Criteria certification is recognized globally by many national governments including the United States, Canada, United Kingdom, Germany, France, Italy, Netherlands, Israel, Spain, Japan, Australia and New Zealand. The standards help build the broadest possible international framework for mutual recognition of IT security products. To achieve Common Criteria certification, organizations must submit IT security products to be evaluated by competent and independent licensed laboratories so as to determine the fulfillment of particular security properties, to a certain extent or assurance (EAL level).

For more information on Entrust's PIV solutions, visit entrust.com/piv-standard.

Tweet It: Tough, Tested and Certified. Entrust receives government approvals with FIPS 201 and FIPS 140 certifications, www.entrust.com/news.

About Entrust
A trusted provider of identity-based security solutions, Entrust secures enterprises, governments, financial institutions, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's customer-centric focus is the foundation to delivering organizations an unmatched level of security, trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424, email [email protected] or visit www.entrust.com

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

(Logo: http://photos.prnewswire.com/prnh/20060720/NYTH074LOGO)

SOURCE Entrust, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.