Logical Access

We all suffer from the effects of password fatigue every day. Increasingly complex password requirements and the spread of cloud-based business applications mean more and more passwords to remember. By providing a single application for accessing a wide variety of logical assets including web apps, workstations, and VPNs, Usher eliminates the need for passwords in the enterprise.

Watch Video
Logical Access

Multiple authentication options.

Authentication shouldn’t be a one-size-fits-all decision. That’s why Usher offers a wide variety of options that include interactive and proximity-based authentication subject to flexible behavior-based parameters. Choose one method or combine multiple options to suit the unique security needs of your business.

  • Bluetooth

    Users can lock and unlock workstations based on Bluetooth proximity.

  • Push Notifications

    Users can authenticate themselves by tapping a confirmation button that is pushed to their phone, tablet, or watch.

  • Biometrics

    Users can authenticate using their own fingerprints on iOS devices.

  • QR Codes

    Usher users can access web portals and unlock workstations by scanning a time-based QR code.

  • One-Time Passwords (OTP)

    Usher badges all include a time-based numeric one-time password which can be used to login into VPNs, portals, or authenticate users on the phone.

Integration with existing systems.

Usher makes it easy to protect access to logical systems with pre-built integrations to a wide variety of applications, VPNs, and workstations. Embed the enterprise of standard of security in every web application across your business.

Web and Cloud-Based Applications

Web and cloud-based applications are at the heart of the modern enterprise. Usher can be configured to provide authentication for any SAML 2.0-enabled application or website. What’s more, Usher comes preconfigured with out-of-the-box gateways for a variety of popular web applications, including Salesforce, Dropbox, Office 365, Google Apps, and GoToMeeting.

Virtual Private Networks (VPN)

VPNs are a critical aspect of an organization’s IT infrastructure. With Usher, it’s easy to configure strong, multi-factor authentication to secure these important networks. Organizations can leverage time-sensitive, one-time passwords, push notifications, or other configuration options to control access to their enterprise VPNs. Usher simplifies the end-user experience without sacrificing security and provides preconfigured support for many different VPN providers, including Cisco, PulseSecure, Citrix, and F5.

Workstations

You enter your password to log in to your computer countless times every week. Shouldn't there be a better way? With Usher, organizations can roll out hands-free access to workstations via Bluetooth proximity. Once configured, users can unlock their computer by bringing their Usher-enabled mobile device within range. A user’s Usher badge enables the Usher client to safely and securely transmit their encrypted password and unlock the paired computer.