Secure Your Enterprise with Usher Mobile Identity

Similar documents
Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Frequently asked questions

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora

WHITE PAPER Usher Mobile Identity Platform

How To Use Usher For Business

Frequently asked questions

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Banking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

Microsoft Enterprise Mobility Suite

ADDING STRONGER AUTHENTICATION for VPN Access Control

STRONGER AUTHENTICATION for CA SiteMinder

Usher: a comprehensive. enterprise security guide

API-Security Gateway Dirk Krafzig

Google Identity Services for work

Cloud Services MDM. ios User Guide

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Ping Identity, Euro Cloud award entry

managing SSO with shared credentials

SAS Mobile BI Security and the Mobile Device

Using Usher at MicroStrategy FAQ

Single Sign On. SSO & ID Management for Web and Mobile Applications

Multi-Factor Authentication of Online Transactions

Mobile Security. Policies, Standards, Frameworks, Guidelines

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Security Architecture Whitepaper

FileCloud Security FAQ

Adding Stronger Authentication to your Portal and Cloud Apps

How TraitWare TM Can Secure and Simplify the Healthcare Industry

Mobile Iron User Guide

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox

Executive Summary P 1. ActivIdentity

Analytics: The Future of Security

Initial DUO 2 Factor Setup, Install, Login and Verification

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Mobile App Security Take Any Mobile App and Make It Secure

Improving Online Security with Strong, Personalized User Authentication

activecho Frequently Asked Questions

nexus Hybrid Access Gateway

NCSU SSO. Case Study

Enterprise Security with mobilecho

How can I protect against the loss of my ID if my device is lost or stolen?

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Building Secure Multi-Factor Authentication

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

SINGLE & SAME SIGN-ON ASPECTS

Mobile Encrypted Messaging: A Perfect Complement to MDM

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

The Convergence of IT Security and Physical Access Control

Two-Factor Authentication

Guide to Evaluating Multi-Factor Authentication Solutions

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

When enterprise mobility strategies are discussed, security is usually one of the first topics

The increasing popularity of mobile devices is rapidly changing how and where we

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business

Entrust IdentityGuard

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

The Convergence of IT Security and Physical Access Control

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Advanced Configuration Steps

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

ENSURING YOUR ENTERPRISE IMAGE-VIEWER IS FULLY SECURE

Entrust IdentityGuard Comprehensive

HOL9449 Access Management: Secure web, mobile and cloud access

Single Sign-on (SSO) technologies for the Domino Web Server

The Security Behind Sticky Password

Authentication Levels. White Paper April 23, 2014

Two Factor Authentication - USER GUIDE

How To Get A Single Sign On (Sso)

mobilecho: 5-Step Deployment Plan for Mobile File Management

Research Information Security Guideline

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

How to wipe personal data and from a lost or stolen mobile device

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Connecting Users with Identity as a Service

SharePlus Enterprise: Security White Paper

Salesforce1 Mobile Security Guide

An Overview of Samsung KNOX Active Directory and Group Policy Features

Flexible Identity Federation

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Architecture Guidelines Application Security

Manual for Android 1.5

Identity in the Cloud

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Cloud Managed Printing

APIs The Next Hacker Target Or a Business and Security Opportunity?

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

IQS Identity and Access Management

TrustedX - PKI Authentication. Whitepaper

One-Time Password Contingency Access Process

Transcription:

Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy

Agenda Introduction to Usher Unlock the enterprise Dematerialize traditional forms of identity The Usher identity Usher capabilities Identity verification Cybersecurity for system access Unlock workstations Physical access Usher Analytics Security Q&A 2

Unlock the enterprise with mobile identity Usher is a mobile identity platform designed to provide security for every business system and application across an enterprise. Dematerialize traditional forms of identity into a mobile identity badge Link the mobile badge to its owner with Touch ID Extend the mobile identity to every business process and application 3

Dematerialize traditional forms of identity Usher replaces traditional forms of identity such as IDs, passwords, and tokens, with mobile identity badges on a smartphone, allowing for advanced authentication while increasing convenience for end users. Mobile identity: advanced authentication Mobile identity: more convenient than traditional methods Inherent multiple factors of authentication PKI encrypted Out-of-band communication No keystrokes Always with you Instantly deployed Instantly revoked Instantly regenerated Bluetooth proximity Usher code scan 4

The Usher identity Usher is an elegant and powerful mobile app that lets users validate their identity in person or over the phone, log in to applications, open entryways, and unlock workstations. Key panel Bluetooth panel Site code panel Validation panel Usher badge 5

Authenticate your identity anytime, anywhere An industrial-strength security checkpoint in your pocket. Confirm identity in person Verify identity over the phone Validate group affiliation Broadcast identity to anyone near you 6

Bolster cybersecurity for system access Usher injects unparalleled speed, simplicity, and security into your business processes and applications. Log in to web applications without entering passwords Deliver SSO for SAML-enabled and mobile applications 7

Unlock workstations securely Usher allows users to log in to workstations with just their smartphones. Unlock Mac workstations using Bluetooth Login and unlock PC workstations by scanning QR code Quickly login to a workstation paired with a smartphone through Bluetooth Low Energy or by scanning a QR Code Provide a more seamless, convenient user experience without the hassle of passwords and tokens 8

Seamlessly access physical entryways Secure every entryway with digital keys. Scan a QR Code Tap an Usher Key 9

Gain a 360-degree view of your network Traditional forms of identification and authentication lack the analytical power to support information-driven decisions. With Usher, all end-user activity is captured and stored in the Usher Analytics database. Cybersecurity Network analysis Usher Analytics provides complete visibility of all identity actions across a network. Analyze your data from many different points of view, filtering on geography, timeframe, identity-related activity, and more. 10

Deploy Usher to the enterprise Usher enables network administrators to deploy and manage thousands of badges in a matter of minutes, while ensuring employees are accessing systems securely. IDMs: Active directory Open LDAP Web and Cloud applications Workstations: Mac (unlock using Bluetooth) Windows 7,8, and Server 2008 Available on: iphone ios 7.0+ ADFS Physical access control systems SAML Android 4.0+ 11

Usher is built from the ground up for bulletproof security Usher incorporates all best practices of security into the platform. Mobile Clients Mobile App 1. AES-GCM encryption of credentials 2. Integrated with biometrics 3. Time-limited QR and Usher codes 4. Offline Usher code generation 5. Encrypted authentication tokens 6. Encrypted X.509 client certificates Site Agents" TLS" Usher Server TLS" Existing ID Repositories" IDMS SSO PACS" Communication 7. Out-of-band transmissions 8. Encrypted channel using TLS protocol with X.509 certificates Usher Server 9. Certificate Authority for clients 10. Encrypted X.509 certificates 11. AES-GCM encryption of credentials 12. OAuth, SAML, and OpenID standards Site Agents 13. Individual IDM agents 14. Encrypted X.509 client certificate for each agent Usher Analytics Intelligence 15. Monitoring, Alerting and Analytics 12

Usher platform: multi-factor authentication Usher provides a multi-factor authentication system to ensure that an Usher mobile identity cannot be compromised or stolen. Something You know Something You have Something You are Phone passcodes ensure that only the owner of the phone can use it. PKI certificates ensure that only a phone registered to a user can authorize the Usher server to present his/her ID. Touch ID adds a layer of security that is convenient for users. 13

Usher platform: four layers of phone security Four layers of security protect identities if a phone is lost or stolen. Layer 1 Phone passcodes Layer 2 Finding or wiping the Phone Layer 3 Touch ID Layer 4 AES-GCM Encryption 14

Questions?

Thank You! Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy