Entrust Datacard Customer Research
67% of Entrust Datacard Instant Issuance customers rate us 4 stars or higher!
|
||
|
||
|
3,473 Customers Surveyed
25,239 Data Points Collected
152 Published TechFacts
121 Published Charts
12 Published Case Studies
Entrust Datacard Case Study
This case study of a medium enterprise telecommunications services company is based on a September 2015 survey of Entrust Datacard customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Entrust Datacard kept the business running despite not having all users in the office.”
The business challenges that led the profiled company to evaluate and ultimately select Entrust Datacard:
The key features and functionalities of Entrust Datacard that the surveyed company uses:
The surveyed company achieved the following results with Entrust Datacard:
Entrust Datacard Case Study
This case study of a large enterprise health care company is based on a September 2015 survey of Entrust Datacard customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Self Service is great, and using the deployed mobile tokens has saved us untold hours of support and management of tokens.”
The business challenges that led the profiled company to evaluate and ultimately select Entrust Datacard:
The key features and functionalities of Entrust Datacard that the surveyed company uses:
The surveyed company achieved the following results with Entrust Datacard:
Entrust Datacard Customer Research
Please rank the importance of the following features to your organization:
Most Important
Very Important
Important
Less Important
Not Important
Identity Proofing |
|
Credential-based authentication (PKI) |
|
Single Sign-on |
|
Role Based Access Control (RBAC), Attribute Based Access Control (ABAC), and dynamic attributes |
|
LDAP |
|
API & URL protection |
|
Passwordless authentication |
|
User authorization (Oauth) |
|
Adaptive Authentication |
|
Identity Provider (IdP) proxy |
|
Session Management |
|
Policy Decision Point (PDP) and Policy Enforcement Point (PEP) |
|
Orchestration |
|
Entrust Website Entrust Website