SlideShare a Scribd company logo
1 of 1
Download to read offline
////////////////////////////////////////////////////////////////////////////////////////////////////

REDUCE COMPLEXITY
STRENGTHEN TRUST
Why the Datacard Group's Strategic Acquisition of Entrust Will Change
Identity-Based Smartcard and Payment Technology

Entrust and Datacard Group offer complementary solutions ranging from financial
transactions, identity authentication, secure communications, critical infrastructure,
access control, citizen identification and more.

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Trusted Identities & Transaction Security
Together, Entrust and Datacard Group secure the world’s most trusted assets,
including digital identities and transactions.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

ID

TOGETHER,

ISSUE

TOGETHER,

HANDLE

123456

10 MILLION 400 BILLION
PHYSICAL IDENTITIES EVERY DAY
SAT

WED

MON
TUES

TRANSACTIONS EACH YEAR

THUR

2013

SUN

FRI

2015

2014

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Trusted by the World’s Elite
With perfectly complementary identity and credentialing solutions, Entrust and
Datacard Group serve tens of thousands of customers worldwide. In fact, the
companies’ combined average tenure of flagship customers is more than 10 years.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

18 OF TOP 20

20 OF TOP 20

eGOVERNMENT

FINANCE

8 OF TOP 10
TELCOS

$
8 OF TOP 10
AEROSPACE

7 OF TOP 10

PHARMACEUTICAL

4 OF TOP 5

PETROLEUM

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Combining Markets, Aligning Opportunity
With consumer, citizen and enterprise demand growing 18 percent annually,
Datacard Group and Entrust technology and expertise perfectly align to stay ahead
of future trends.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

CONNECTED DEVICES BY 2017

PAYMENT CARDS IN CIRCULATION BY 2016

18 BILLION

123456

MOBILE DEVICES BY 2016

10 BILLION

ANNUAL CYBERCRIME

$650 BILLION

30 BILLION

////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Who is the Datacard Group?
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

GLOBAL

A
COMPANY BASED IN MINNESOTA,
DATACARD GROUP OFFERS THE INDUSTRY’S BEST-SELLING BRAND OF
SECURE IDENTIFICATION AND CARD PERSONALIZATION SOLUTIONS.

400+
CITIZEN

PROJECTS

150+
COUNTRIES

1,500+ EMPLOYEES
26 REGIONAL OFFICES

250+ PARTNERS
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

A Stronger Entrust for You
The Datacard Group acquisition of Entrust introduces new opportunity to expand on
the company’s identity-based security solutions and drive new growth in both new
and existing markets.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

&

YOU

BETTER SERVICES IN HIGHLY
CONNECTED ENVIRONMENTS
INTEGRATION TO SECURE
PAYMENT & IDENTITY ECOSYSTEMS
SHARED STRATEGY OFFERS
CUSTOMERS CHOICE & VERSATILITY
entrust.com | 888.690.2424

ABOUT ENTRUST
A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s
award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access,
citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.
* All figures from internal or proprietary sources and metrics.

More Related Content

Similar to INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?

Emarketing Association Keynote March 2014
Emarketing Association Keynote March 2014Emarketing Association Keynote March 2014
Emarketing Association Keynote March 2014BusinessOnline
 
Emarketing Keynote 2014
Emarketing Keynote 2014Emarketing Keynote 2014
Emarketing Keynote 2014BusinessOnline
 
BusinessOnline - Automating PPT with Tableau Dashboards
BusinessOnline - Automating PPT with Tableau Dashboards BusinessOnline - Automating PPT with Tableau Dashboards
BusinessOnline - Automating PPT with Tableau Dashboards Eric Ramos
 
#MWC15Health rick valencia qualcommlife
#MWC15Health rick valencia qualcommlife#MWC15Health rick valencia qualcommlife
#MWC15Health rick valencia qualcommlife3GDR
 
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life Europe
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life EuropeDWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life Europe
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life EuropeIDATE DigiWorld
 
SXSW 2014: Trends Overview
SXSW 2014: Trends OverviewSXSW 2014: Trends Overview
SXSW 2014: Trends OverviewTable19
 
10 Trends on Mobile
10 Trends on Mobile10 Trends on Mobile
10 Trends on MobileTable19
 
Global remittances product writeup
Global remittances   product writeupGlobal remittances   product writeup
Global remittances product writeupPartho Chakraborty
 
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results BookMaria Gabriela da Rocha Oliveira
 
AMR 2006 Proxy Statement
AMR 	2006 Proxy StatementAMR 	2006 Proxy Statement
AMR 2006 Proxy Statementfinance11
 

Similar to INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust? (20)

Emarketing Association Keynote March 2014
Emarketing Association Keynote March 2014Emarketing Association Keynote March 2014
Emarketing Association Keynote March 2014
 
Be an ROI Guy (or Gal)
Be an ROI Guy (or Gal)Be an ROI Guy (or Gal)
Be an ROI Guy (or Gal)
 
Emarketing Keynote 2014
Emarketing Keynote 2014Emarketing Keynote 2014
Emarketing Keynote 2014
 
BusinessOnline - Automating PPT with Tableau Dashboards
BusinessOnline - Automating PPT with Tableau Dashboards BusinessOnline - Automating PPT with Tableau Dashboards
BusinessOnline - Automating PPT with Tableau Dashboards
 
#MWC15Health rick valencia qualcommlife
#MWC15Health rick valencia qualcommlife#MWC15Health rick valencia qualcommlife
#MWC15Health rick valencia qualcommlife
 
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life Europe
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life EuropeDWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life Europe
DWS17 - eHealth seminar - Laurent VANDEBROUCK - Qualcomm Life Europe
 
2015 dodge dart
2015 dodge dart2015 dodge dart
2015 dodge dart
 
Icalogon
IcalogonIcalogon
Icalogon
 
Domestic Mobile Roaming Inquiry May 2017
Domestic Mobile Roaming Inquiry May 2017Domestic Mobile Roaming Inquiry May 2017
Domestic Mobile Roaming Inquiry May 2017
 
SXSW 2014: Trends Overview
SXSW 2014: Trends OverviewSXSW 2014: Trends Overview
SXSW 2014: Trends Overview
 
10 Trends on Mobile
10 Trends on Mobile10 Trends on Mobile
10 Trends on Mobile
 
Xuhuong
XuhuongXuhuong
Xuhuong
 
Chaos Theory | Car Tech Issue
Chaos Theory | Car Tech IssueChaos Theory | Car Tech Issue
Chaos Theory | Car Tech Issue
 
JoelChampionResume2
JoelChampionResume2JoelChampionResume2
JoelChampionResume2
 
Global remittances product writeup
Global remittances   product writeupGlobal remittances   product writeup
Global remittances product writeup
 
Sankula
SankulaSankula
Sankula
 
Hoja de control
Hoja de controlHoja de control
Hoja de control
 
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book
2013-07-08 - 2013 Rio Wind Solar Leadership Forum Results Book
 
2020 GlobalSpec Media Kit
2020 GlobalSpec Media Kit2020 GlobalSpec Media Kit
2020 GlobalSpec Media Kit
 
AMR 2006 Proxy Statement
AMR 	2006 Proxy StatementAMR 	2006 Proxy Statement
AMR 2006 Proxy Statement
 

More from Entrust Datacard

INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesEntrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 
INFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsEntrust Datacard
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

More from Entrust Datacard (14)

INFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL CertificatesINFOGRAPHIC: Switch to SHA-2 SSL Certificates
INFOGRAPHIC: Switch to SHA-2 SSL Certificates
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 
INFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of ThingsINFOGRAPHIC: Securing the Internet of Things
INFOGRAPHIC: Securing the Internet of Things
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

INFOGRAPHIC: Why Did Datacard Group Acquire Security Expert Entrust?

  • 1. //////////////////////////////////////////////////////////////////////////////////////////////////// REDUCE COMPLEXITY STRENGTHEN TRUST Why the Datacard Group's Strategic Acquisition of Entrust Will Change Identity-Based Smartcard and Payment Technology Entrust and Datacard Group offer complementary solutions ranging from financial transactions, identity authentication, secure communications, critical infrastructure, access control, citizen identification and more. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// Trusted Identities & Transaction Security Together, Entrust and Datacard Group secure the world’s most trusted assets, including digital identities and transactions. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// ID TOGETHER, ISSUE TOGETHER, HANDLE 123456 10 MILLION 400 BILLION PHYSICAL IDENTITIES EVERY DAY SAT WED MON TUES TRANSACTIONS EACH YEAR THUR 2013 SUN FRI 2015 2014 //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// Trusted by the World’s Elite With perfectly complementary identity and credentialing solutions, Entrust and Datacard Group serve tens of thousands of customers worldwide. In fact, the companies’ combined average tenure of flagship customers is more than 10 years. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// 18 OF TOP 20 20 OF TOP 20 eGOVERNMENT FINANCE 8 OF TOP 10 TELCOS $ 8 OF TOP 10 AEROSPACE 7 OF TOP 10 PHARMACEUTICAL 4 OF TOP 5 PETROLEUM //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// Combining Markets, Aligning Opportunity With consumer, citizen and enterprise demand growing 18 percent annually, Datacard Group and Entrust technology and expertise perfectly align to stay ahead of future trends. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// CONNECTED DEVICES BY 2017 PAYMENT CARDS IN CIRCULATION BY 2016 18 BILLION 123456 MOBILE DEVICES BY 2016 10 BILLION ANNUAL CYBERCRIME $650 BILLION 30 BILLION //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// Who is the Datacard Group? //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// GLOBAL A COMPANY BASED IN MINNESOTA, DATACARD GROUP OFFERS THE INDUSTRY’S BEST-SELLING BRAND OF SECURE IDENTIFICATION AND CARD PERSONALIZATION SOLUTIONS. 400+ CITIZEN PROJECTS 150+ COUNTRIES 1,500+ EMPLOYEES 26 REGIONAL OFFICES 250+ PARTNERS //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// A Stronger Entrust for You The Datacard Group acquisition of Entrust introduces new opportunity to expand on the company’s identity-based security solutions and drive new growth in both new and existing markets. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// & YOU BETTER SERVICES IN HIGHLY CONNECTED ENVIRONMENTS INTEGRATION TO SECURE PAYMENT & IDENTITY ECOSYSTEMS SHARED STRATEGY OFFERS CUSTOMERS CHOICE & VERSATILITY entrust.com | 888.690.2424 ABOUT ENTRUST A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. * All figures from internal or proprietary sources and metrics.