Welcome!

SDN Journal Authors: Yeshim Deniz, Elizabeth White, Liz McMillan, Pat Romanski, TJ Randall

News Feed Item

Entrust IdentityGuard Provides Strong Authentication for Nortel Remote Access

Entrust IdentityGuard 7.2 makes cost-effective strong authentication available for Nortel enterprise remote access customers

DALLAS, June 14 /PRNewswire-FirstCall/ -- Entrust, Inc. , a world leader in securing digital identities and information, today announced the integration of the Entrust IdentityGuard solution with a market-leading remote access solution from Nortel Networks (NYSE: NT; TSX: NT), Nortel VPN Router (formerly Contivity), to help enable organizations deploy industry- leading security to protect the enterprise without having to incur the typical high costs of strong authentication hardware devices. This integration makes low-cost two-factor authentication for global remote access available for use with one of the market leading products in remote access, and has been certified Entrust Ready status under Entrust's global partner program.

Entrust IdentityGuard is a new strong authentication solution that replaces more expensive and traditional battery-powered tokens. The Entrust IdentityGuard solution makes use of a unique grid of characters and numbers that are in turn used to answer a random challenge, generated when accessing enterprise remote access gateways or sensitive applications.

"One of the strengths of emerging remote access systems is that they can be used to grant access to customers and partners in addition to employees. The key to that access is the ability to positively identify the user," said Charles Kolodgy, research director of Security Products at IDC. "Entrust IdentityGuard provides a simple, cost effective and secure method for performing this user authentication."

"There are millions of remote access users worldwide that need strong authentication to secure access to their networks, to protect key information like corporate IP and sensitive customer information. In the past, the choices were largely limited to expensive, battery-powered tokens," pointed out Kevin Simzer, Senior Vice President at Entrust. "Entrust IdentityGuard changes the entire enterprise security landscape. Now, enterprises can realize the cost savings delivered by Virtual Private Networks (VPNs) with affordable security. This integration with Nortel, a long-time Entrust partner and one of the industry leaders in remote access control technologies, is critical to help meet the demand for strong authentication with remote access at a low cost."

Entrust has worked rigorously to provide for a painless integration of Entrust IdentityGuard with the Nortel VPN Router. Entrust has architected the solution such that it is possible for organizations using Nortel remote access products to make only minor configuration modifications to their current gateway, with no requirement for client-side changes, reducing both cost and time for deployment. The Entrust Ready testing environment leveraged industry leader Funk Software's Steel-Belted Radius Server as the certified option for Radius in combination with Nortel VPN Router.

General availability for Entrust IdentityGuard 7.2 is planned for June 2005. For more information on Entrust IdentityGuard, please visit: http://www.entrust.com/identityguard/index.htm.

About Nortel

Nortel is a recognized leader in delivering communications capabilities that enhance the human experience, ignite and power global commerce, and secure and protect the world's most critical information. Serving both service provider and enterprise customers, Nortel delivers innovative technology solutions encompassing end-to-end broadband, Voice over IP, multimedia services and applications, and wireless broadband designed to help people solve the world's greatest challenges. Nortel does business in more than 150 countries. For more information, visit Nortel on the Web at http://www.nortel.com/

About Entrust

Entrust, Inc. is a world-leader in securing digital identities and information. Over 1,400 enterprises and government agencies in more than 50 countries use Entrust solutions to help secure the digital lives of their citizens, customers, employees and partners. Our proven software and services can help customers in achieving regulatory and corporate compliance, while helping to turn security challenges such as identity theft and e-mail security into business opportunities. For more information on how Entrust can help secure your digital life, please visit: http://www.entrust.com/

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

This press release contains forward-looking statements relating to a new version of the Entrust IdentityGuard product that Entrust expects to release and the expected benefits of such new release, and such statements involve a number of risks and uncertainties. Among the important factors that could cause actual results to differ materially from those indicated by such forward-looking statements are delays or failure to complete development and/or testing of this new release, failure of this new release to support or interoperate with various hardware and software products used by typical enterprise, government and/or service provider customers, delays in the training of Entrust's sales/marketing forces in respect to the capabilities of the new release, undetected software errors or bugs in the new release, competitive pressures, market acceptance of the new release, changes in customer requirements, governmental regulations including failure to procure the necessary export classifications for the new release, general economic conditions and the risk factors detailed from time to time in Entrust's periodic reports and registration statements filed with the Securities and Exchange Commission, including without limitation Entrust's Quarterly Report on Form 10-Q for the quarter ended March 31, 2005. Entrust cautions investors that it might not update any or all of the foregoing forward-looking statements.

Entrust, Inc.

CONTACT: Robert Vankirk of Entrust, Inc., +1-972-713-5834,
[email protected]; or Doug McGinn of Dittus Communications,
+1-202-715-1558, [email protected]

Web site: http://www.entrust.com/
http://www.entrust.com/identityguard/index.htm
http://www.nortel.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is being used on IBM Cloud, Amazon, and Microsoft Azure and how to gain access to these resources in the cloud... for FREE!
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure.
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully been able to harness the excess capacity of privately owned vehicles and turned into a meaningful business. This concept can be step-functioned to harnessing the spare compute capacity of smartphones that can be orchestrated by MEC to provide cloud service at the edge.