On February 14, 2026, identity and payment security provider Entrust and technology leader Google announced a strategic partnership to innovate in the field of identity verification. This collaboration will focus on integrating their respective technologies to create solutions powered by Artificial Intelligence (AI). The primary goal is to build more resilient defenses against a new generation of sophisticated, AI-driven fraud and identity attacks. The partnership also aims to improve the user experience during onboarding, balancing robust security with operational efficiency. This move signals a significant industry trend where AI is being leveraged not just by attackers, but as a critical component of modern defense strategies.
The collaboration between Entrust and Google is designed to create an integrated solution that helps organizations strengthen their security posture. While specific product details were not announced, the partnership will likely involve:
This partnership is a direct response to the evolving threat landscape where malicious actors are increasingly using AI to scale and enhance their attacks. These AI-powered threats include:
By using AI for defense, Entrust and Google aim to create systems that can detect and adapt to these novel threats in real-time, moving beyond static, rule-based security.
This partnership will have a significant impact on the Identity and Access Management (IAM) market.
Organizations can prepare to leverage these future technologies by focusing on the following strategic areas:
The partnership aims to enhance identity verification, a core component of modern MFA systems.
AI-driven security relies on behavioral analysis to detect anomalies indicative of fraud or compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats