Page 5 - Make decentralized identity a reality
P. 5

Empower citizens to                         Enable frictionless



 control their identity                      digital experiences







 Today’s citizen has limited to no control over their   A citizen’s digital identity is constantly at risk.

 personal information online.                Identity management and security is more important than ever in an age of
                                             endless data breaches. With VU’s complete cybersecurity portfolio, organizations
 Aspects of an individual’s identity are disparate, strewn across a multitude of   can combine identity recognition and facial biometrics to seamlessly and accu-
 apps and services. What if you could offer people a new identity model that lets   rately verify each person’s identity. This verification process completes the Azure
 them authenticate their identity and personal information with third parties   AD verifiable credentials platform, enabling fluid digital verification that your
 without forcing them to give up control over who has access to their data? VU   employees, contractors, vendors, or customers can use in multiple scenarios.
 accelerates Microsoft’s mission to make Decentralized Identity (DID) a reality
 through verifiable credentials.







 Change the way the world views identity           A future-proof trust model

 Organizations can replace identifiers, such as   protect privacy and secure transactions.    Just as they would manage   controls, even when they’re
 usernames and passwords, with independent,   These IDs or verifiable credentials enable    any other permission requests,   issued by organizations.
 self-owned IDs that enable data exchange using   rapid identity proofing through VU’s powerful    users can manage and present   Because verifiable credentials
 blockchain and distributed ledger technology to   DID platform.  verifiable credentials using   are attached to DIDs that
                                                   Microsoft Authenticator, with   individuals own, they can be
                                                   one key difference. Unlike      confident that they—and only
                                                   domain-specific credentials,    they—control who has access
                                                   verifiable credentials function   to their information.
                                                   as “proofs” that an individual
































 4                                                            5                      © 2021 VU™ Security. All Rights Reserved.
   1   2   3   4   5   6   7   8