Page 4 - Make decentralized identity a reality
P. 4

Empower citizens to                                                                                                                                             Enable frictionless



        control their identity                                                                                                                                          digital experiences







        Today’s citizen has limited to no control over their                                                                                                            A citizen’s digital identity is constantly at risk.

        personal information online.                                                                                                                                    Identity management and security is more important than ever in an age of
                                                                                                                                                                        endless data breaches. With VU’s complete cybersecurity portfolio, organizations
        Aspects of an individual’s identity are disparate, strewn across a multitude of                                                                                 can combine identity recognition and facial biometrics to seamlessly and accu-
        apps and services. What if you could offer people a new identity model that lets                                                                                rately verify each person’s identity. This verification process completes the Azure
        them authenticate their identity and personal information with third parties                                                                                    AD verifiable credentials platform, enabling fluid digital verification that your
        without forcing them to give up control over who has access to their data? VU                                                                                   employees, contractors, vendors, or customers can use in multiple scenarios.
        accelerates Microsoft’s mission to make Decentralized Identity (DID) a reality
        through verifiable credentials.







              Change the way the world views identity                                                                                                                        A future-proof trust model

              Organizations can replace identifiers, such as    protect privacy and secure transactions.                                                                     Just as they would manage       controls, even when they’re
              usernames and passwords, with independent,        These IDs or verifiable credentials enable                                                                   any other permission requests,   issued by organizations.
              self-owned IDs that enable data exchange using    rapid identity proofing through VU’s powerful                                                                users can manage and present    Because verifiable credentials
              blockchain and distributed ledger technology to   DID platform.                                                                                                verifiable credentials using    are attached to DIDs that
                                                                                                                                                                             Microsoft Authenticator, with   individuals own, they can be
                                                                                                                                                                             one key difference. Unlike      confident that they—and only
                                                                                                                                                                             domain-specific credentials,    they—control who has access
                                                                                                                                                                             verifiable credentials function   to their information.
                                                                                                                                                                             as “proofs” that an individual
































                                                              4                                                                                                                         5                       © 2021 VU™ Security. All Rights Reserved.
   1   2   3   4   5   6   7   8