TechValidate Research on Entrust

112 Charts – Page 1 of 4


Entrust Identity Customer Research

Which of the following statements do you agree with after using Entrust Identity?

Entrust has better overall quality compared to other authentication/IAM vendors.
50%
Entrust has better overall value relative to other authentication/IAM vendors.
42%
Entrust Identity helped us gain competitive advantage.
33%
Entrust Identity offers the lowest TCO relative to other authentication/IAM vendors.
16%

Entrust Identity Customer Research

What benefits has your organization achieved since using Entrust Identity?

Helped you meet evolving security compliance standards
66%
Helped you improve your security posture
57%
Helped you improve IT productivity
24%
Helped you address your hybrid / multi-cloud security management challenges
19%

Entrust Identity Customer Research

Why did you select Entrust Identity?

Advanced security features
59%
Ease of use
52%
User self-service tools
28%
After sales support
22%
Price
22%
Mobile SDK
12%

Entrust products Customer Research

How many different authentication/identity vendors does your organization rely upon today?

5+
8%
1
20%
2-5
72%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

49%

40%

11%

Orchestration

13%

65%

22%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

42%

43%

15%

Identity proofing and validation

58%

33%

9%

Multi-factor authentication (MFA)

63%

31%

6%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

37%

27%

36%

Orchestration

10%

45%

45%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

37%

45%

18%

Identity proofing and validation

50%

30%

20%

Multi-factor authentication (MFA)

55%

36%

9%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

25%

48%

27%

Orchestration

13%

48%

39%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

36%

42%

22%

Identity proofing and validation

32%

56%

12%

Multi-factor authentication (MFA)

69%

28%

3%

Entrust products Customer Research

As you may be aware, we recently changed our company name from Entrust Datacard to Entrust.

What is your impression of this brand change?

Neutral
49%
Positive
39%
Was not aware
11%
Negative
1%

Entrust products Customer Research

In addition to Identity (authentication), what other Entrust solutions do you use today?

Entrust Certificate Services (TLS/SSL, Qualified Certificates)
81%
Entrust Public Key Infrastructure (Security Manager)
46%
Entrust Digital Signing (Document Signing, Secure Email, TrustedX)
27%
Entrust nShield HSMs (formerly nCipher and Thales)
17%
Entrust Access Control) Systems (formerly Datacard)
11%
Entrust Instant Issuance Systems (formerly Datacard)
6%
Entrust Central Issuance Systems (formerly Datacard)
4%

Entrust products Customer Research

When researching different security solutions what are your top three purchasing criteria?

Price
69%
After-sales support
67%
Vendor reputation / longevity
57%
Support for high assurance use cases
47%
Help setting up the solution
41%
Portfolio breadth (vendor has more than just one product or feature set)
26%
Availability of Training
24%

Entrust products Customer Research

When researching different security solutions what are your top three purchasing criteria?

Price
68%
After-sales support
65%
Vendor reputation / longevity
58%
Help setting up the solution
47%
Support for high assurance use cases
38%
Availability of Training
22%
Portfolio breadth (vendor has more than just one product or feature set)
17%

Entrust products Customer Research

Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.

High Priority Priority Low Priority
3rd party reports – i.e. industry, association, and analyst reports

26%

54%

20%

Analyst calls and engagements

15%

49%

36%

Vendor materials – collateral, webinars, etc.

21%

52%

27%

Customer references

32%

51%

17%

Web searches

16%

54%

30%

Tradeshows and virtual events

14%

38%

48%

Entrust products Customer Research

Please rank the relative importance of these different information sources on your IAM decision-making process from highest to lowest.

High Priority Priority Low Priority
3rd party reports – i.e. industry, association, and analyst reports

17%

53%

30%

Analyst calls and engagements

11%

43%

46%

Vendor materials – collateral, webinars, etc.

20%

46%

34%

Customer references

27%

46%

27%

Web searches

13%

48%

39%

Tradeshows and virtual events

14%

35%

51%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

37%

44%

19%

Orchestration

15%

58%

27%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

40%

47%

13%

Identity proofing and validation

53%

41%

6%

Multi-factor authentication (MFA)

74%

25%

1%

Entrust products Customer Research

Please rank the relative priority of these capabilities on your IAM roadmap from highest to lowest:
High Priority Priority Low Priority
Identity governance

34%

44%

22%

Orchestration

13%

53%

34%

Role Based Access Control (RBAC) / Attribute Based Access Control (ABAC)

38%

43%

19%

Identity proofing and validation

42%

47%

11%

Multi-factor authentication (MFA)

66%

30%

4%

Entrust products Customer Research

What does biometric mean to you?

Use of device biometric capabilities (i.e. fingerprint, facial recognition): 78%
Use of gesture based biometric (i.e. swipe, angle of hold, typing cadence): 1%
Both: 21%

Entrust products Customer Research

If yes/deployed, what type(s) of passwordless access will/have you implement/ed?

Credential-based (mobile PKI)
56%
Mobile push
42%
Biometrics
40%
FIDO
15%

Entrust products Customer Research

Is passwordless access on your 2021 roadmap?

No
61%
Yes
31%
Already deployed
8%

Entrust products Customer Research

Is passwordless access on your 2021 roadmap?

No
70%
Yes
25%
Already deployed
5%

Entrust products Customer Research

What is your IAM direction for 2021?

Augment your existing IAM implementation – i.e. support new/different authenticators and use cases
49%
Manage your existing IAM implementation (no change)
41%
Consolidate your different IAM solutions
34%
Migrate to the cloud
33%
Replace your existing IAM implementation
11%

Entrust products Customer Research

What is your IAM direction for 2021?

Manage your existing IAM implementation (no change)
49%
Augment your existing IAM implementation – i.e. support new/different authenticators and use cases
41%
Migrate to the cloud
27%
Consolidate your different IAM solutions
23%
Replace your existing IAM implementation
7%

Entrust products Customer Research

Relative to 2020, did your 2021 Identity and Access Management (IAM) budget…

Increase
38%
Stay the same
56%
Decrease
6%

Entrust products Customer Research

Relative to 2020, did your 2021 Identity and Access Management (IAM) budget…

Increase
26%
Stay the same
67%
Decrease
7%

Entrust products Customer Research

Relative to 2020, did your overall 2021 IT budget…

Increase
34%
Stay the same
51%
Decrease
16%

Entrust products Customer Research

Relative to 2020, did your overall 2021 IT budget…

Increase
35%
Stay the same
47%
Decrease
18%

Entrust products Customer Research

Relative to 2020, did your overall 2021 IT budget…

Increase
28%
Stay the same
53%
Decrease
19%

Entrust products Customer Research

How did COVID impact your 2020 Identity and Access Management (IAM) priorities?

Enabled a significant permanent remote workforce
48%
Accelerated cloud adoption/migration
42%
Implemented MFA for workforce
38%
Replaced physical authenticators like smart cards with digital authenticators like soft tokens
25%
Implemented MFA for consumers
15%

Entrust products Customer Research

How did COVID impact your 2020 Identity and Access Management (IAM) priorities?

Enabled a significant permanent remote workforce
54%
Accelerated cloud adoption/migration
33%
Implemented MFA for workforce
33%
Replaced physical authenticators like smart cards with digital authenticators like soft tokens
16%
Implemented MFA for consumers
11%

Entrust products Customer Research

How many different authentication/identity vendors does your organization rely upon today?

5+
8%
2-5
71%
1
20%

Entrust products Customer Research

What types of use cases do you or your team have responsibility for Identity and Access Management (IAM) technology, including Multi-Factor Authentication (MFA)?

For workforce use cases: 47%
For consumer use cases: 9%
For both: 44%



More Research on Entrust