
Entrust Identity Enterprise
Multi-factor authentication (MFA) software
Biometric authentication software
Customer identity and access management (CIAM) software
Identity and access management (IAM) software
Passwordless authentication software
Risk-based authentication software
User provisioning and governance tools
Identity management software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Entrust Identity Enterprise and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Energy and utilities
- Public sector and nonprofit organizations
- Banking and insurance
What is Entrust Identity Enterprise
Entrust Identity Enterprise is an identity and access management platform used to authenticate users and control access to enterprise applications and systems. It supports multi-factor authentication, certificate-based authentication, and risk-based policies for workforce and partner access use cases. The product is commonly deployed in regulated environments that require strong credential assurance and integration with public key infrastructure (PKI). It is typically implemented by IT/security teams and integrated with directories, VPNs, and web access gateways.
Strong PKI and certificate support
The platform supports certificate-based authentication and can align with organizations that already use smart cards or enterprise PKI. This is useful for higher-assurance access scenarios where possession-based credentials and cryptographic identity are required. It also fits environments that need lifecycle management around credentials rather than only OTP-style MFA.
Multiple authentication methods
Entrust Identity Enterprise supports MFA options that can include hardware/software tokens, certificates, and other factors depending on deployment. This helps organizations standardize authentication across different user populations and access channels. It can reduce reliance on a single factor type and support step-up authentication for sensitive actions.
Policy and risk-based controls
The product supports policy-driven access decisions that can incorporate contextual or risk signals to adjust authentication requirements. This enables step-up flows (for example, requiring stronger factors when risk increases) and can improve control consistency across applications. It is relevant for enterprises that need centralized enforcement rather than app-by-app configuration.
Implementation can be complex
Deployments that include PKI, certificates, or smart cards often require careful design, integration, and operational processes. Organizations may need specialized expertise to integrate with existing directories, access gateways, and credential issuance workflows. This can increase time-to-value compared with lighter-weight authentication-only deployments.
CIAM depth may vary
While the product can be used for external users in some scenarios, CIAM programs often require extensive customer-facing features such as progressive profiling, consent management, and highly customizable registration journeys. Organizations may need additional components or development work to meet consumer identity UX and scale requirements. This can be a consideration when the primary goal is customer identity rather than workforce access.
Ongoing credential operations overhead
Certificate- and token-based approaches can introduce operational overhead for issuance, renewal, revocation, and user support. Helpdesk processes and device lifecycle management can become significant, especially in large distributed workforces. Organizations should plan for governance and automation to avoid manual administration.
Seller details
Entrust Corporation
Shakopee, Minnesota, USA
1969
Private
https://www.entrust.com/
https://x.com/Entrust
https://www.linkedin.com/company/entrust/


