"We think of a mobile device as a pretty good credential - just like my behaviours in a normal online world, I'm going to have different behaviours in the mobile world. The more I track what I do, the more I can deal with enabling you as a business, customer or citizen," said Conner.
"If you think about it, my mobile phone goes with me more than any other digital credential I've got. My phone could be my physical credential into my building, it could be my logical access to the desktop - if I get up and walk away from my desk and it logs me off."
Holtz added that enterprises should be coupling their high value and high risk operations to identity assurance via a mobile phone. He said: "If you could identity assure those high risk, high value transactions, we know you'd defeat the malware."
He added that Entrust's solutions have little impact on systems for companies looking to implement identity assurance.
"If you run critical infrastructure we can drop our solution in there, we are not touching your stuff, leave it running - it's a 'zero touch solution'. When an employee is trying to activate something high-value, we can use the phone to ask: 'Are you trying to turn access this system, yes or no?'" said Holtz.
"Then you can also build in analytics on top of the infrastructure that states that that system can only be accessed if you are sitting at a certain terminal in a certain control room - using the mobile. If you are not in the room and your Bluetooth tells us you walked out the building, there's something fundamentally wrong with that transaction."
Sign up for CIO Asia eNewsletters.