MicroStrategy Collaborates With AMAG Technology

AMAG Technology (a G4S Company), a security solution provider specializing in access control, video management, policy-based identity solutions and visitor management, and MicroStrategy® Incorporated (Nasdaq: MSTR), a leading worldwide provider of enterprise software platforms, announced a modern, next-generation physical access control solution combining MicroStrategy?s Usher and AMAG Technology?s Symmetry Access Control.

The integration delivers:

  • a modern user experience with digital identity on smartphones;
  • improved security and access controls with centrally managed digital credentials, flexible multi-factor authentication and automated credential revocation;
  • continuous policy compliance by leveraging real-time user access intelligence; and
  • reduced operational costs for identity, credentialing and access management by simplifying life-cycle process workflows, data exchange, and compatibility with existing access control infrastructure.

?The combination of MicroStrategy?s Usher and AMAG?s Symmetry delivers a superior, next-generation physical access control solution that addresses a critical need in the market,? said Tim Lang, Chief Technology Officer at MicroStrategy Incorporated. ?By turning your mobile device into a digital badge, organizations can unlock extraordinary levels of access intelligence, often underutilized, on enterprise access and authentication. This insight can be used to make critical decisions that investigate access anomalies, enhance operational awareness, and personalize authentication to enterprise assets, leading to smarter, more productive workforces.?

?AMAG?s Symmetry Preferred Partner Program offers a wide portfolio of seamlessly integrated security technologies for Symmetry users, including identity management, video, visitor management and biometrics, all on a single platform,? said Dave Ella, Vice President of Product Marketing at AMAG Technology. ?Our collaboration with MicroStrategy offers an option for AMAG customers worldwide to implement the Usher mobile identity solution with their Symmetry installation, taking advantage of the recent trend towards secure digital identity without the need for a smart card.?

How Usher Works with Symmetry
Usher, the digital identity component of the MicroStrategy 10? platform, is a mobile application that replaces or augments traditional identity credentials and physical access systems. Usher badges collect telemetry and transaction data as well as centrally-managed privilege settings from Symmetry to enable continuous compliance, behavioral analytics, alerts, and customizable dashboards and reports. This rich set of data can be used by organizations to uncover access anomalies and intelligence, introduce additional factors of authentication, or assign new badge types and requirements. To learn more about how MicroStrategy 10 helps enterprises digitize access to facilities, download a copy of the white paper Digital Transformation of Facilities with MicroStrategy 10.

Usher and Symmetry Provide Ease of Use and Configurable Security Controls
Usher supports a variety of methods for a registered user to gain access to Symmetry-authorized access points (doors, gates, turnstiles, etc.) by tapping soft keys, scanning QR codes and NFC tags, and leveraging Bluetooth? communication. Bluetooth enables micro-location services with facility mapping and enables built-in, two-way secure communication for personnel, contractors and visitors.

Usher can be bound to a user?s specific mobile device, including support for rapid, remote issuance and revocation. Usher also supports geo-fencing and date/time-fencing, as well as both biometric and PIN verification for multi-factor or step-up authentication, some or all of which can be enforced at one or more Symmetry-authorized access points or facilities.

Usher can also serve as a unified identity credential for enterprise users by providing logical access authentication to enterprise assets, such as Windows? and Mac? computers (including via Bluetooth) and enterprise networks and directories. It can also deliver web and application Single Sign On (SSO) leveraging SAML, OAuth, OpenID Connect and other integrations.

Source: amag.com
0 Comments