Page 2 - Make decentralized identity a reality
P. 2

Citizens demand to



                                                                                                                                   control their own identity







        80% of data breaches in 2020         37B is the total number of records    Global cybercrime damages are                   Your identity has many facets.
        involved a customer’s PII. 1         compromised in 2020, a 141%           predicted to reach $6 trillion
                                             increase compared to 2019. .2         annually by the end of 2021. 3                  Digital identities are no longer as   entertainment, interests, and more.
                                                                                                                                   simple as a username and password.   With all these bits of personal
                                                                                                                                   We live in a world where your physical   information scattered across organiza-
                                                                                                                                   and digital identities converge. This   tions, apps, and services, it’s difficult
              VU is the only partner in LATAM chosen by                                                                            may include your education, pur-     to control who is using and abusing
                                                                                                                                   chases, achievements, relationships,
                                                                                                                                                                        your identity.
              Microsoft for Decentralized Identity (DID).


















               Contents

               Citizens demand to control their own identity .....................................................................................................3
                 Your identity has many facets. ........................................................................................................................................3
                 Take back control over your identity with VU DID and Microsoft Azure AD verifiable credentials. ...................3     Take back control over your identity with VU DID
                                                                                                                                          and Microsoft Azure AD verifiable credentials.
               Empower citizens to control their identity ...........................................................................................................4
                 Today’s citizen has limited to no control over their personal information online.  .............................................4
                                                                                                                                          EMPOWER CITIZENS TO             ENABLE SAFE AND FRICTIONLESS     PROACTIVELY PREVENT FRAUD
               Enable frictionless digital experiences ..................................................................................................................5  CONTROL THEIR IDENTITY  DIGITAL EXPERIENCES  Leverage machine learning to

                 A citizen’s digital identity is constantly at risk.  ............................................................................................................5  Give power back to the citizens   Streamline the creation and   create intelligent profiles and
                                                                                                                                          with a new identity model pow-  use of verifiable credentials by   detect fraudulent operations
               Proactively prevent fraud ......................................................................................................................................6  ered by blockchain technology.  combining identity recognition   based on user behavior.

                 Knowledge-based authentication, like passwords, is no longer secure. ...............................................................6                    with facial biometrics.
               One verification, multiple uses ..............................................................................................................................7
                                                                                                                                                   Learn more                       Learn more                      Learn more










                                                              2                                                                                                                         3                       © 2021 VU™ Security. All Rights Reserved.
   1   2   3   4   5   6   7