The Wayback Machine - https://web.archive.org/all/20050211160145/http://www.entrust.com:80/governance/entrust_isg.htm
Login | Support | Help | Contact Us

Solutions
Entrust and ISG

Information Security Governance

Entrust Solutions and Professional Services


Implementing an Information Security Governance (ISG) program can deliver tangible benefits to an organization beyond simply legislative compliance, including:

  • improved internal processes and controls
  • reduced audit and insurance costs
  • market/competitive differentiation as perceived by a commitment to continuous governance review and improvement
  • self-governance as a better alternative to regulation

To realize these benefits requires the help of a trusted advisor with the right leadership and technologies to do the job.

Entrust is an acknowledged leader in delivering Identity and Access Management solutions and professional services that support the information security requirements set out by the multitude of global government regulations around Corporate and Information Security Governance.

Entrust ISG Quick Start Program

Entrust began its own Information Security Governance program in early 2003, and has been working with the U.S. Federal Government and industry associations to develop a methodology for self-assessment, remediation and reporting suitable for organizations of all sizes. As the framework evolved, so too did Entrust's self-assessment program, offering an opportunity to field-test the concepts and guidance.

Entrust is committed to managing information security as part of the Corporate Governance process.

Along the way, a number of valuable lessons have been learned. To help organizations capitalize on these best practices, Entrust developed a three-day ISG Quick Start Program.

Using the framework as guidance, experienced Entrust professional services consultants will work with the customer to complete an initial assessment of information security practices within selected business segments. Initial findings will then be presented to C-level executives to help them develop more comprehensive corporate-wide ISG policies, and implement ISG as a continual improvement process.

Overall, the Quick Start exercise is geared to helping customers:

  • understand the value of ISG
  • interpret the content of the Corporate Governance task force's ISG framework
  • implement a self-assessment process that is in line with ISO 17799 standards
  • drive awareness/acceptance of Information Security Governance as a corporate responsibility

For more information on the Entrust ISG Quick Start program, have an Entrust representative contact you.

Entrust Solutions

Entrust delivers a suite of solutions that collectively provide the strong security functionality required for organizations to more confidently:

  • know who they are dealing with, by managing identities and access rights for large numbers of users both inside and outside the organization;

  • protect privacy and confidentiality of online transactions and messages to lessen the risks of unauthorized access to or theft of sensitive personal and business information; and

  • enforce information security policy through centralized control and audit of who has access to what information, and how they are using it.

Identity management

  • secure one-step process to add and remove users streamlines access control across large user populations and can help reduce the risk of errors that may lead to unauthorized access, theft or fraud
  • workflow capabilities allow mandatory corporate approval processes to be enforced and audited
  • Entrust Secure Identity Management Solution provides secure centralized user provisioning, workflow, audit and user self-service

Strong authentication

  • strong user authentication enables a user population that is accountable for each transaction and data access request
  • Entrust Secure Identity Management Solution delivers Web and enterprise authentication using a broad range of identity types, including user name/password, SAML, Microsoft Passport, and digital certificates stored on a user's computer or smart card, USB token or biometric device
  • Entrust Secure Data Solution strongly authenticates user access to encrypted files, folders and e-forms
  • Entrust Secure Messaging Solution strongly authenticates user access to e-mail messages

Policy-based access control

  • centralized access control management protects sensitive data and applications against unauthorized use
  • Entrust Secure Identity Management delivers Web and enterprise authorization, and extends to Web services via standards like SAML

Data encryption (in transit or at rest)

  • end-to-end encryption enables protection of data at all stages of the data lifecycle process
  • Entrust Secure Data Solution helps protect sensitive data either stored on PCs/laptops, servers and databases, or 'in transit' via standard Web and file transfer mechanisms
  • Entrust Secure Messaging Solution enables e-mail messages to be encrypted both in transit and while at rest on e-mail servers or in end-user inboxes and outboxes
  • Entrust Certificate Services provides Web server SSL certificates to enable basic encryption between Web browsers and Web servers

Digital signatures

  • digital signatures help protect the integrity and authenticity of online information and transactions
  • Entrust Secure Messaging Solution enables users to digitally sign e-mails to confirm the integrity of messages and attachments exchanged over the Internet
  • Entrust Secure Data Solution enables digital signatures for e-forms to create a record of accountability

Audit

  • maintaining records of all transactions and approvals provide organizations the internal controls they need to satisfy strict auditing and policy management requirements outlined in many regulations
  • Entrust Secure Identity Management Solution provides administration and auditing capabilities through a centrally managed secure system, helping organizations to view and log user activity as they access multiple business applications
  • all Entrust security solutions provide centralized session management that controls user sign on and provides activity logging

For more information on how Entrust solutions can help you facilitate compliance with regulations, have an Entrust representative contact you.

Find out how Entrust solutions can help you facilitate compliance with the Sarbanes-Oxley Act.

Contact Me!


Press Releases
Corporate Governance Task Force Releases Industry Framework
White Papers
Cyber Security Collaboration
Information Security Governance
Case Studies
Entrust and ISG
Web Seminars
California SB 1386 Compliance
Solution Brochure
California's Breach Disclosure Law
Information Security Governance

Architecture Diagram

click to enlarge
Site Map | Privacy Statement | Legal

Copyright 2005 Entrust. All rights reserved.