Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
Values
Reduce Costs
Ensure Security and Business Continuity
VeridiumID
VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company’s mobile app.
About Product
Description
This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography.
VeridiumID installs easily within your network to provide authentication to enterprise applications, websites, even doors. And it works just by you being you.
You can use VeridiumID to replace hard and soft tokens as a second authentication factor. In addition to what you know – your password – you are adding two additional factors; what you have – your mobile device – and what you are – your biometrics.
Are you ready to eliminate passwords? Our technology and unique storage architecture combine to provide true identity authentication. The software handles everything from biometric data collection and encryption, secure storage, and the ability to perform matching on the device or server during authentication sessions.
VeridiumID Benefits:
- Supports multiple biometric libraries, including 4 Finger TouchlessID, allowing for complete configuration of authentication systems
- Provides complete control over the entire solution, from configuring the biometrics used to set rules for varying security demands
- By encrypting biometric vectors with Visual Cryptography and storing them between the device and server, it is nearly impossible for them to be compromised or stolen
- Built on open standard IEEE 2410 and supported by a working group which continues to advance this standard, future-proofing your investment
- Easily integrates into your existing corporate infrastructure without additional hardware
- Reduces password resets, help desk requests and support calls by up to 90 percent
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company