Usher is a mobile identity network that enables enterprises to render digital credentials, or “badges,” on users’ mobile devices. Usher increases enterprise security and safety by allowing organizations to:
- Issue digital identification badges to employees on their phones
- Validate and ensure the identity or credentials of any individual
- Replace physical keys and access cards with software keys
- Replace passwords with time-limited access codes
- Securely sign, store, and share digital documents and media
- Capture abnormal activity with behavior monitoring analytics
Cardless Identity. At Your Fingertips.
Mobile device adoption is changing the way that keys, cards and personal credentials are issued by organizations and carried by users. Traditional personal identifiers, such as licenses, badges, diplomas, cards and credentials, are rendered digitally on users’ smartphones with Usher. Usher proves the validity of these credentials in seconds wherever identity is presented.
Replace Passwords. Increase Security.
Passwords are inherently insecure and weaken enterprise security. Usher generates time-limited access codes that can be used to log on to networks and systems. Use Usher to bulletproof your organization, and reduce the possibility of fraud, identity theft, hacking and data loss.
Mobile Keys. Safer and Easier.
With Usher, organizations can provide mobile keys to employees to ensure safe and secure access to buildings and secured areas. Unlike physical keys, Usher mobile keys cannot be lost, copied or stolen. In addition, Usher mobile keys can be instantly distributed or revoked.
Assure Identity. Simple and Trusted.
Usher enables employees to gain proof of one another's identities either in-person or remotely in order to ensure highly secure business interactions. Users can simply type a pin code, scan a QR code, or read a sonic code to instantly verify another user’s credentials. Users are able to validate the identity of anyone they meet prior to providing access to information, sites or systems, or before entering into transactions.
Digital Signatures. Transmit Sensitive Documents.
Usher enables the safe and secure transmission of signed documents, both within and outside an enterprise. Users can sign, receive and manage their electronic documents on a mobile device anytime, anywhere. Usher eliminates the risk of fraud by generating cryptographic signatures that are impossible to replicate. Further, in Usher, only authorized users may view document signatures and the signed documents themselves.
Behavior Monitoring Analytics. Smarter.
Mobile Identity systems support comprehensive behavior monitoring, allowing organizations to quickly detect and respond to abnormal activity. Usher Intelligence leverages the power of industry-leading MicroStrategy Analytics to provide both real-time alerting and trend analysis capabilities.