Strong Authentication

Multi-factor authentication is great for security, but the friction it causes during every login can be a burden on legitimate users. By combining multi-factor authentication with the native device capabilities of smartphones, Usher can deliver adaptive security that requires additional factors of authentication only when certain risk-based criteria are met.

Strong Authentication
Multiple Authenticaton Options

Customize security with adaptive authentication.

Multi-factor authentication is great for security, but the friction it causes during every login can be a burden on legitimate users. By combining multi-factor authentication with the native device capabilities of smartphones, Usher can deliver adaptive security that requires additional factors of authentication only when certain risk-based criteria are met.

  • Geofencing

    Geo-fencing via the smartphone's GPS capabilities allows Usher administrators to broadly limit access based on a user's geographic location, which protects against suspicious authentication requests coming from unusual areas.

  • Timefencing

    Time-fencing locks Usherized systems and gateways from being accessed by certain (or all) users during certain times. This guards against unsafe use of facilities and systems after hours.

  • One-Time Passwords (OTP)

    Usher comes with a built-in soft token which uses an algorithm to generate one-time-passwords (OTPs). Within the Usher paradigm, Usher OTPs not only allow you to conveniently log into VPNs from outside the firewall, but can also confirm your identity to any other organizational member possessing an Usher badge.

  • QR Codes

    Traditionally, people scanned QR codes to pull up a resource on the internet. Usher's ingenious application of QR codes allows users to access secure enterprise resources and gateways using a built-in QR scanner in the Usher Security app.

  • Push Notifications

    Push notifications communicate to a user that there is an action they might want to take, enabling users to quickly act on their anticipated desires. Enterprise resources can be Usherized in a fashion so that when a user tries to access it, a push notification is sent to a user's Usher client on his/her smartphone or smartwatch. In this way, Usher provides both convenience to the user and security to the organization.

  • Biometrics

    Many people with a smartphone actually have a biometric fingerprint reader in their pockets. Usher integrates with this hardware to provide an added layer of security when accessing whichever assets or resources an enterprise deems to be high-value.

  • Proximity

    Bluetooth readers and beacons are a modern means of achieving proximity-based authentication. Usher is compatible with a wide variety of Bluetooth technologies, allowing both doorways and devices to unlock when within range of an authorized Usher user.