How To Use Usher For Business



Similar documents
Secure Your Enterprise with Usher Mobile Identity

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today

Executive Summary P 1. ActivIdentity

WHITE PAPER Usher Mobile Identity Platform

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

ADDING STRONGER AUTHENTICATION for VPN Access Control

STRONGER AUTHENTICATION for CA SiteMinder

Analytics: The Future of Security

Frequently asked questions

Banking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions

API-Security Gateway Dirk Krafzig

Top 5 Reasons to Choose User-Friendly Strong Authentication

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

APIs The Next Hacker Target Or a Business and Security Opportunity?

API Management: Powered by SOA Software Dedicated Cloud

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

MicroStrategy Desktop MicroStrategy 10.2: New features overview. microstrategy.com 1

Usher: a comprehensive. enterprise security guide

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Improving Online Security with Strong, Personalized User Authentication

The Essential Security Checklist. for Enterprise Endpoint Backup

Longmai Mobile PKI Solution

NCSU SSO. Case Study

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App

RSA Identity and Access Management 2014

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Jim Bray, Cyber Security Adviser InfoSight, Inc.

Security Architecture Whitepaper

Assuring Application Security: Deploying Code that Keeps Data Safe

Axway API Portal. Putting APIs first for your developer ecosystem

MicroStrategy Course Catalog

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Guide to Evaluating Multi-Factor Authentication Solutions

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Google Identity Services for work

Protect Your Business and Customers from Online Fraud

Multi-Factor Authentication of Online Transactions

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

The Homebuilder Intelligence Suite

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

TECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION. Any device. Any application. Any authenticator.

SERVICES. Software licensing and entitlement management delivered in the cloud for the cloud

Swivel Secure and the Cloud

Windows Server 2012 R2 The Essentials Experience

Adding Stronger Authentication to your Portal and Cloud Apps

If you can't beat them - secure them

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Kore Bots Platform Competitive Comparison Overview Kore Bots Platform Competitive Comparison Overview

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions

Advanced Biometric Technology

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

BMC Remedy IT Service Management Suite

Strengthen security with intelligent identity and access management

10 Threats to Successful. Enterprise Endpoint Backup

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

expanding web single sign-on to cloud and mobile environments agility made possible

Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform

CyberArk Privileged Threat Analytics. Solution Brief

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Transcription:

MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform

Nearly 90% of IT Security Professionals Are Concerned About A Data Breach in 2015 1 cyber attack Every 18 seconds 42% increase In annual cyber attacks 60% of US companies Hit by at least one fraud a year 21% of companies Affected by information theft $114 billion Annual cost of cyber crime in the US 2

Why does this keep happening? Companies rely on 20 th century thinking to secure a digital world.

Yesterday s Enterprise Paradigm is Obsolete Password Security token ID verification in person Badge Keys ID verification over the phone 4

Usher Enterprise Security Platform is the Solution It dematerializes your credentials into digital badges that securely connect logical assets to physical systems. Physical Systems Watch Phone Tablet Laptop Desktop Doors Facilities Vehicles Safe Gate MicroStrategy Enterprise Platform Usher Security Usher Mobile Usher Analytics Server Cloud Gateways SDK Credentials Logical Enterprise Assets Processes Data Applications Domains 5

Usher is Three Powerful Solutions in One Usher Security Usher Mobile Usher Analytics All employees, vendors, and customers Sales reps, field service, managers, and executives Analysts, data scientists, administrators, and database architects The key to unlock your enterprise Replace badges, passwords, physical tokens, and keys with an app. The security badge allows identification, logical access, physical access, and transaction authorization. Information at your fingertips Personalized and localized intelligence about resource utilization, transaction authorization, and all other activity in the enterprise. The platform for building custom reports Combine access and authorization data with all other data sources within the organization for performance insights. 6

sher Usher Security ecurity Replaces passwords, badges, physical tokens, and keys with an app

Usher Delivers Authenticated and Secure Access Our amazing app delivers enterprise security without sacrificing convenience. Physical badges A more secure solution Passwords Security tokens Keys Replace with Usher Badge Multi-factor No dedicated devices Single instance Dynamic Biometrically linked Encrypted Geo-fenced Telemetry Users have the Usher Badge on their smartphones to validate identity and securely access any system. 8

Usher Easily Extends to Every Business System in the Enterprise Connect to popular systems with preconfigured connectors and extend to custom systems with SDK. Out-of-the-box Custom ERP Payments Reservations Ticketing Machine operations Signatures SAML ADFS 9

Usher Can Be the Backbone Of Any Mobile App Embed Usher authentication into any app with the Usher Client SDK. The SDK extends Usher functionality to your mobile apps. Wire Transfers Loyalty Service Payments Entertainment Air Travel Biometrics Geo-fencing Transactions authorization Peer-to-peer and app authentication 10

sher Usher Mobile obile Personalized information at your fingertips

Usher Mobile is a Powerful Workforce Productivity Application Out-of-the-box app allows you to identify, communicate with, organize, and track users. 1 Identify and communicate with users 2 Organize groups 3 Track activity Instantly find Usher users around you and communicate with them. Use snapshots to create groups which you then can track and manage. Monitor activity by user, resource, location, and process. 12

Usher Mobile Allows You to View Standard and Custom Analytics Reports Create and distribute custom reports and dashboards to your professional workforce. 13

sher Usher Analytics nalytics Complete visibility into your organization

Usher Analytics is the Development Workstation for Custom Analytics Standard Reports Custom Reports Data scientists and analysts build a variety of standard reports and distribute them to knowledge workers Power users develop custom analytics by integrating multiple data sources 15

Build and View Sophisticated Reports Integrate multiple data sources, let analysts create reports, and view on Usher Mobile. Operations reports Risk and compliance Marketing reports Sales reports Data scientists Risk Management Marketing Analysts Sales Operations Power users build reports and applications Distribute reports on Usher Mobile Enterprise databases Usher databases Choose your data sources to integrate with Usher Third-party databases 16

sher Usher Deployment eploymen Enterprise Security and Visibility in One Week

Enterprise Security and Visibility in One Week Deploy Usher pilot program via your data center or our secure cloud. Deploy Usher Day Monday 1 Tuesday 2 Wednesday 3 Thursday 4 Friday 5 Deployment option 1: Usher on-premises Build and deploy badges for employees, customers, vendors, and executives Deploy Usher Mobile to managers, sales team, and executives Customize Usher Mobile with sales and marketing analytics Monitor the system and add compliance and risk analytics Reap the benefits Deployment option 2: Usher in the Cloud 18

Usher Revolutionary Enterprise Security Platform Deploy all three modules, or start with Usher Security and add as needed. Usher Security Usher Mobile Usher Analytics API Uber Starbucks Watch app Usher Badge Client SDK OOTB app Custom mobile analytical apps Rich and uncompromised enterprise analytics Security Server Mobile Server Analytics Server 19

icrostrategy E trategy Enterpr Usher is an enterprise security solution that eliminates passwords and other outdated methods of authentication. Extensible to your Secur entire enterprise, quickly, and easily.