Usher (software)
   HOME
*





Usher (software)
Usher is an enterprise security platform released by Microstrategy, Inc. in 2015. The technology is designed to replace user-entered passwords with biometric identity and multi-step authentication methods, and features digital badges and geo-fencing administration options. The service takes the form of a mobile application that allows users to access both physical and digital space based on more passive identification methods (facial recognition, Bluetooth discovery, etc). Overview Usher has been positioned as a "password killer" that is based on moving towards security credentials more tied to identity and place. Applications that can be managed via Usher include Salesforce.com, Google Apps, and select Microsoft software. The security features of the product are backed up by Usher Analytics, which allows administrators to assess data in real time to identify threats and behavioral abnormalities. Clients Organizations that use Usher include: *Georgetown University *1776 *Saudi Ar ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computer Security Software
Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense. The defense of computers against intrusion and unauthorized use of resources is called ''computer security''. Similarly, the defense of computer networks is called ''network security''. The subversion of computers or their unauthorized use is referred to using the terms ''cyberwarfare'', ''cybercrime'', or ''security hacking'' (later shortened to ''hacking'' for further references in this article due to issues with ''hacker'', ''hacker culture'' and differences in white/grey/black 'hat' color identification). Types Below, various software implementations of Cybersecurity patterns and groups outlining ways a host syste ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]