VeridiumID
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Values

Reduce Costs

Ensure Security and Business Continuity

VeridiumID

VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company’s mobile app.

Description

This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography. VeridiumID installs easily within your network to provide authentication to enterprise applications, websites, even doors. And it works just by you being you. You can use VeridiumID to replace hard and soft tokens as a second authentication factor. In addition to what you know – your password – you are adding two additional factors; what you have – your mobile device – and what you are – your biometrics. Are you ready to eliminate passwords? Our technology and unique storage architecture combine to provide true identity authentication. The software handles everything from biometric data collection and encryption, secure storage, and the ability to perform matching on the device or server during authentication sessions. VeridiumID Benefits:
  • Supports multiple biometric libraries, including 4 Finger TouchlessID, allowing for complete configuration of authentication systems
  • Provides complete control over the entire solution, from configuring the biometrics used to set rules for varying security demands
  • By encrypting biometric vectors with Visual Cryptography and storing them between the device and server, it is nearly impossible for them to be compromised or stolen
  • Built on open standard IEEE 2410 and supported by a working group which continues to advance this standard, future-proofing your investment
  • Easily integrates into your existing corporate infrastructure without additional hardware
  • Reduces password resets, help desk requests and support calls by up to 90 percent

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company