Click here to close now.


@CloudExpo Authors: Elizabeth White, Yeshim Deniz, Liz McMillan, Chris Fleck, Jason Bloomberg

News Feed Item

Entrust Aligns with INTERPOL's Global Mission to Secure Identities, Protect Borders in Fight against Terrorism, Trafficking and Organized Online Crime

- Entrust to demonstrate law enforcement solutions for secure collaboration, communication and mobile security technology during INTERPOL 81st General Assembly

DALLAS, Nov. 5, 2012 /PRNewswire/ -- An ally of law enforcement agencies and departments across the world, Entrust Inc. maintains unwavering support for securing identities and protecting borders in INTERPOL's global fight against terrorism, trafficking and other organized crime.

During the INTERPOL 81st General Assembly in Rome this week, Entrust will demonstrate how law enforcement may leverage strong authentication, encryption and mobile security technology to verify identities, secure communication and protect global collaboration between agencies.

"The INTERPOL General Assembly serves as invaluable networking hub between law enforcement agencies, departments and offices across the world," said Entrust President and CEO Bill Conner. "This initiative is a true catalyst for realizing global security change — whether the focus is on better security practices, policy enforcement or the simple task of building and maintaining positive relationships."

Entrust is committed to innovation that enables law enforcement to not only authenticate identities, but also collaborate with other officers, departments or agencies across the world — regardless of their previous relationship. This invaluable event helps develop and shape the technology that will assist law enforcement in completing INTERPOL's core objectives.

"Backed by Entrust's security expertise and software innovation, INTERPOL helps establish global standards for the use of identity-based security technology for law enforcement, border security and other critical police initiatives," said INTERPOL Secretary General Ronald K. Noble. "Our collaborative efforts are positively shaping the security landscape to help make the world safer and more secure."

Entrust strongly aligns with INTERPOL's drive to globally deploy technology that can properly issue and inspect all travel documents to quickly identify criminals, protect citizens and safeguard international borders. In fact, Entrust provides public key infrastructure (PKI) technology for strong border control and authentication of identities and biometric datasets on today's electronic machine-readable travel documents (eMRTDs).

"Entrust and INTERPOL enjoy a highly successfully working relationship that is helping shape the future of border security and identity authentication," said Conner. "This partnership provides proven technology for properly issuing, inspecting and authenticating identity-based travel documents — particularly for international officials with critical, time-sensitive objectives."

Throughout the annual General Assembly, Entrust will exhibit innovative mobile technologies for identity authentication and physical and logical access, as well as methods for law enforcement to leverage identity-based technology for inspection of high-assurance credentials — such as ePassports and other electronic IDs — for stronger border security.

Entrust, in collaboration with partner Morpho, also provides INTERPOL officers with second-generation travel documents to provide the foundation for special Visa status from granting member countries. Officers only need the single multipurpose smartcard for secure enterprise access and expedited border crossings at countries which have provided special visa status to INTERPOL travel document holders.

For more than 15 years, Entrust has been working with governments, police and the law enforcement community to meet advanced security requirements. More than 100 law enforcement organizations worldwide trust Entrust, including INTERPOL, Serious Organized Crime Organization (SOCA), RCMP, Norwegian Ministry of Defense, UK Ministry of Defense and more.

The INTERPOL General Assembly is composed of delegates appointed by the governments of 190 member countries. The General Assembly, INTERPOL's governing body, meets each year to discuss and vote on all major decisions affecting general policy, resources needed for international cooperation, working methods, finances and other activities.

With 190 member countries, INTERPOL is the world's largest international police organization. Created in 1923, it facilitates cross-border police cooperation, and supports and assists all organizations, authorities and services whose mission is to prevent or combat international crime.

>>Tweet It: Entrust Aligns w/INTERPOL's Global Mission to Secure Identities, Protect Borders. Read Entrust's INTERPOL case study,

About Entrust

A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust's award-winning software authentication platforms manage today's most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email [email protected] or visit

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Data loss happens, even in the cloud. In fact, if your company has adopted a cloud application in the past three years, data loss has probably happened, whether you know it or not. In his session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will present how common and costly cloud application data loss is and what measures you can take to protect your organization from data loss.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
JFrog has announced a powerful technology for managing software packages from development into production. JFrog Artifactory 4 represents disruptive innovation in its groundbreaking ability to help development and DevOps teams deliver increasingly complex solutions on ever-shorter deadlines across multiple platforms JFrog Artifactory 4 establishes a new category – the Universal Artifact Repository – that reflects JFrog's unique commitment to enable faster software releases through the first pla...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.