TechValidate Research on Entrust

122 Charts – Page 1 of 5


Entrust Customer Research

What primary functions will be supported by subscribing to an as-a-service HSM solution?

Public Key Infrastructure (PKI)
60%
Key Management
57%
Data Encryption/Decryption
49%
Digital Signatures
46%
Authentication
31%

Entrust Customer Research

If applicable, how do your consumers/citizens authenticate themselves?

Mobile push: 25%
Grid cards: 1%
Hard tokens: 5%
Soft tokens: 16%
Biometrics: 4%
One Time Password (OTP): 35%
Other: 14%

Entrust Customer Research

In addition to Entrust Identity (Authentication, Access Management, Authorization), what other Entrust solutions do you use today?

Entrust Certificate Services (TLS, SSL, Qualified Certificates)
62%
Entrust Public Key Infrastructure (Security Manager)
47%
Entrust nShield HSMs (formerly nCipher and Thales)
26%
Entrust Digital Signing (Document Signing, Secure Email, TrustedX)
21%
Entrust Access Control Systems (formerly Datacard)
19%
Entrust Central Issuance Systems (formerly Datacard)
15%
Entrust Instant Issuance Systems (formerly Datacard)
9%

Entrust Customer Research

Do your consumers/citizens use smartphones/mobiles for user authentication?

Yes: 79%
No: 21%

Entrust Customer Research

Does your workforce use smartphones/mobiles for user authentication?

Yes: 89%
No: 11%

Entrust Customer Research

A good frictionless user experience to you means?

Single Sign On (SSO)
57%
Passwordless + SSO
49%
Passwordless authentication
34%
Using social login for applications/web access
13%
Other
2%

Entrust Customer Research

What are your security priorities?

Remote access to extended workforce (employees, partners, contractors etc.)
76%
Protecting your applications
56%
Securing digital transactions
33%
Safe access to consumers/citizens/users (not workforce)
29%
Facilitating compliance (mention which one)
18%
Other
2%

Entrust Customer Research

How many workforce and/or consumer IAM solutions exist in your digital ecosystem?

More than 5: 26%
2-5: 49%
1: 26%

Entrust Customer Research

Who do you want to secure with a security solution?

Workforce: 69%
Consumers: 21%
Citizens: 11%

Entrust Customer Research

Who do you want to secure with a security solution?

Workforce: 69%
Consumers: 21%
Citizens: 11%

Entrust Identity Customer Research

Which of the following statements do you agree with after using Entrust Identity?

Entrust has better overall quality compared to other authentication/IAM vendors.
50%
Entrust has better overall value relative to other authentication/IAM vendors.
42%
Entrust Identity helped us gain competitive advantage.
33%
Entrust Identity offers the lowest TCO relative to other authentication/IAM vendors.
16%

Entrust Identity Customer Research

What benefits has your organization achieved since using Entrust Identity?

Helped you meet evolving security compliance standards
66%
Helped you improve your security posture
57%
Helped you improve IT productivity
24%
Helped you address your hybrid / multi-cloud security management challenges
19%

Entrust Identity Customer Research

Why did you select Entrust Identity?

Advanced security features
59%
Ease of use
52%
User self-service tools
28%
After sales support
22%
Price
22%
Mobile SDK
12%

Entrust products Customer Research

How many different authentication/identity vendors does your organization rely upon today?

5+
8%
1
20%
2-5
72%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

49%

40%

11%

Orchestration

13%

65%

22%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

42%

43%

15%

Identity proofing and validation

58%

33%

9%

Multi-factor authentication (MFA)

63%

31%

6%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

37%

27%

36%

Orchestration

10%

45%

45%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

37%

45%

18%

Identity proofing and validation

50%

30%

20%

Multi-factor authentication (MFA)

55%

36%

9%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

25%

48%

27%

Orchestration

13%

48%

39%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

36%

42%

22%

Identity proofing and validation

32%

56%

12%

Multi-factor authentication (MFA)

69%

28%

3%

Entrust products Customer Research

As you may be aware, we recently changed our company name from Entrust Datacard to Entrust.

What is your impression of this brand change?

Neutral
49%
Positive
39%
Was not aware
11%
Negative
1%

Entrust products Customer Research

In addition to Identity (authentication), what other Entrust solutions do you use today?

Entrust Certificate Services (TLS/SSL, Qualified Certificates)
81%
Entrust Public Key Infrastructure (Security Manager)
46%
Entrust Digital Signing (Document Signing, Secure Email, TrustedX)
27%
Entrust nShield HSMs (formerly nCipher and Thales)
17%
Entrust Access Control) Systems (formerly Datacard)
11%
Entrust Instant Issuance Systems (formerly Datacard)
6%
Entrust Central Issuance Systems (formerly Datacard)
4%

Entrust products Customer Research

When researching different security solutions what are your top three purchasing criteria?

Price
69%
After-sales support
67%
Vendor reputation / longevity
57%
Support for high assurance use cases
47%
Help setting up the solution
41%
Portfolio breadth (vendor has more than just one product or feature set)
26%
Availability of Training
24%

Entrust products Customer Research

When researching different security solutions what are your top three purchasing criteria?

Price
68%
After-sales support
65%
Vendor reputation / longevity
58%
Help setting up the solution
47%
Support for high assurance use cases
38%
Availability of Training
22%
Portfolio breadth (vendor has more than just one product or feature set)
17%

Entrust products Customer Research

Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.

High Priority Priority Low Priority
3rd party reports – i.e. industry, association, and analyst reports

26%

54%

20%

Analyst calls and engagements

15%

49%

36%

Vendor materials – collateral, webinars, etc.

21%

52%

27%

Customer references

32%

51%

17%

Web searches

16%

54%

30%

Tradeshows and virtual events

14%

38%

48%

Entrust products Customer Research

Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.

High Priority Priority Low Priority
3rd party reports – i.e. industry, association, and analyst reports

17%

53%

30%

Analyst calls and engagements

11%

43%

46%

Vendor materials – collateral, webinars, etc.

20%

46%

34%

Customer references

27%

46%

27%

Web searches

13%

48%

39%

Tradeshows and virtual events

14%

35%

51%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

37%

44%

19%

Orchestration

15%

58%

27%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

40%

47%

13%

Identity proofing and validation

53%

41%

6%

Multi-factor authentication (MFA)

74%

25%

1%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

34%

44%

22%

Orchestration

13%

53%

34%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

38%

43%

19%

Identity proofing and validation

42%

47%

11%

Multi-factor authentication (MFA)

66%

30%

4%

Entrust products Customer Research

What does biometric mean to you?

Use of device biometric capabilities (i.e. fingerprint, facial recognition): 78%
Use of gesture based biometric (i.e. swipe, angle of hold, typing cadence): 1%
Both: 21%

Entrust products Customer Research

If yes/deployed, what type(s) of passwordless access will/have you implement/ed?

Credential-based (mobile PKI)
56%
Mobile push
42%
Biometrics
40%
FIDO
15%

Entrust products Customer Research

Is passwordless access on your 2021 roadmap?

No
61%
Yes
31%
Already deployed
8%

Entrust products Customer Research

Is passwordless access on your 2021 roadmap?

No
70%
Yes
25%
Already deployed
5%

Entrust products Customer Research

What is your IAM direction for 2021?

Augment your existing IAM implementation – i.e. support new/different authenticators and use cases
49%
Manage your existing IAM implementation (no change)
41%
Consolidate your different IAM solutions
34%
Migrate to the cloud
33%
Replace your existing IAM implementation
11%



More Research on Entrust