Entrust Customer Research
What primary functions will be supported by subscribing to an as-a-service HSM solution?
Public Key Infrastructure (PKI) |
|
|
Key Management |
|
|
Data Encryption/Decryption |
|
|
Digital Signatures |
|
|
Authentication |
|
Entrust Customer Research
In addition to Entrust Identity (Authentication, Access Management, Authorization), what other Entrust solutions do you use today?
Entrust Certificate Services (TLS, SSL, Qualified Certificates) |
|
|
Entrust Public Key Infrastructure (Security Manager) |
|
|
Entrust nShield HSMs (formerly nCipher and Thales) |
|
|
Entrust Digital Signing (Document Signing, Secure Email, TrustedX) |
|
|
Entrust Access Control Systems (formerly Datacard) |
|
|
Entrust Central Issuance Systems (formerly Datacard) |
|
|
Entrust Instant Issuance Systems (formerly Datacard) |
|
Entrust Customer Research
What are your security priorities?
Remote access to extended workforce (employees, partners, contractors etc.) |
|
|
Protecting your applications |
|
|
Securing digital transactions |
|
|
Safe access to consumers/citizens/users (not workforce) |
|
|
Facilitating compliance (mention which one) |
|
|
Other |
|
Entrust Identity Customer Research
Which of the following statements do you agree with after using Entrust Identity?
Entrust has better overall quality compared to other authentication/IAM vendors. |
|
|
Entrust has better overall value relative to other authentication/IAM vendors. |
|
|
Entrust Identity helped us gain competitive advantage. |
|
|
Entrust Identity offers the lowest TCO relative to other authentication/IAM vendors. |
|
Entrust Identity Customer Research
What benefits has your organization achieved since using Entrust Identity?
Helped you meet evolving security compliance standards |
|
|
Helped you improve your security posture |
|
|
Helped you improve IT productivity |
|
|
Helped you address your hybrid / multi-cloud security management challenges |
|
Entrust products Customer Research
High Priority | Priority | Low Priority | |
---|---|---|---|
Identity governance |
49% |
40% |
11% |
Orchestration |
13% |
65% |
22% |
Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC) |
42% |
43% |
15% |
Identity proofing and validation |
58% |
33% |
9% |
Multi-factor authentication (MFA) |
63% |
31% |
6% |
Entrust products Customer Research
High Priority | Priority | Low Priority | |
---|---|---|---|
Identity governance |
37% |
27% |
36% |
Orchestration |
10% |
45% |
45% |
Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC) |
37% |
45% |
18% |
Identity proofing and validation |
50% |
30% |
20% |
Multi-factor authentication (MFA) |
55% |
36% |
9% |
Entrust products Customer Research
High Priority | Priority | Low Priority | |
---|---|---|---|
Identity governance |
25% |
48% |
27% |
Orchestration |
13% |
48% |
39% |
Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC) |
36% |
42% |
22% |
Identity proofing and validation |
32% |
56% |
12% |
Multi-factor authentication (MFA) |
69% |
28% |
3% |
Entrust products Customer Research
In addition to Identity (authentication), what other Entrust solutions do you use today?
Entrust Certificate Services (TLS/SSL, Qualified Certificates) |
|
|
Entrust Public Key Infrastructure (Security Manager) |
|
|
Entrust Digital Signing (Document Signing, Secure Email, TrustedX) |
|
|
Entrust nShield HSMs (formerly nCipher and Thales) |
|
|
Entrust Access Control) Systems (formerly Datacard) |
|
|
Entrust Instant Issuance Systems (formerly Datacard) |
|
|
Entrust Central Issuance Systems (formerly Datacard) |
|
Entrust products Customer Research
When researching different security solutions what are your top three purchasing criteria?
Price |
|
|
After-sales support |
|
|
Vendor reputation / longevity |
|
|
Support for high assurance use cases |
|
|
Help setting up the solution |
|
|
Portfolio breadth (vendor has more than just one product or feature set) |
|
|
Availability of Training |
|
Entrust products Customer Research
When researching different security solutions what are your top three purchasing criteria?
Price |
|
|
After-sales support |
|
|
Vendor reputation / longevity |
|
|
Help setting up the solution |
|
|
Support for high assurance use cases |
|
|
Availability of Training |
|
|
Portfolio breadth (vendor has more than just one product or feature set) |
|
Entrust products Customer Research
Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.
High Priority | Priority | Low Priority | |
---|---|---|---|
3rd party reports – i.e. industry, association, and analyst reports |
26% |
54% |
20% |
Analyst calls and engagements |
15% |
49% |
36% |
Vendor materials – collateral, webinars, etc. |
21% |
52% |
27% |
Customer references |
32% |
51% |
17% |
Web searches |
16% |
54% |
30% |
Tradeshows and virtual events |
14% |
38% |
48% |
Entrust products Customer Research
Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.
High Priority | Priority | Low Priority | |
---|---|---|---|
3rd party reports – i.e. industry, association, and analyst reports |
17% |
53% |
30% |
Analyst calls and engagements |
11% |
43% |
46% |
Vendor materials – collateral, webinars, etc. |
20% |
46% |
34% |
Customer references |
27% |
46% |
27% |
Web searches |
13% |
48% |
39% |
Tradeshows and virtual events |
14% |
35% |
51% |
Entrust products Customer Research
High Priority | Priority | Low Priority | |
---|---|---|---|
Identity governance |
37% |
44% |
19% |
Orchestration |
15% |
58% |
27% |
Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC) |
40% |
47% |
13% |
Identity proofing and validation |
53% |
41% |
6% |
Multi-factor authentication (MFA) |
74% |
25% |
1% |
Entrust products Customer Research
High Priority | Priority | Low Priority | |
---|---|---|---|
Identity governance |
34% |
44% |
22% |
Orchestration |
13% |
53% |
34% |
Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC) |
38% |
43% |
19% |
Identity proofing and validation |
42% |
47% |
11% |
Multi-factor authentication (MFA) |
66% |
30% |
4% |
Entrust products Customer Research
What is your IAM direction for 2021?
Augment your existing IAM implementation – i.e. support new/different authenticators and use cases |
|
|
Manage your existing IAM implementation (no change) |
|
|
Consolidate your different IAM solutions |
|
|
Migrate to the cloud |
|
|
Replace your existing IAM implementation |
|