Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

IoT Security Update: July 2020

Veridify Security News Welcome to the July issue of our IoT newsletter.  We hope this email finds you and your families able to enjoy some safe and healthy summer activities despite the persistence of coronavirus in some parts of the world. This summer, our team has been extremely busy working on some exciting developments in…
Read More

Ripple20 Vulnerabilities from Louis Parks, Veridify Security Chairman and CEO

For anyone who follows security and the IoT, the recently identified “Ripple20” vulnerabilities revealed by the Israeli firm JSOF will not be a surprise. However, as the number of connected devices continues to grow exponentially, what these recent flaws dramatically showcase is the extent to which we are becoming reliant on IoT devices in both…
Read More

IoT Security Update: June 2020

Veridify Security News To our valued customers and partners around the world – we hope this email finds you and your families safe and healthy during this unprecedented health crisis and the recent political unrest around the country. Here in Connecticut (U.S.), the state is gradually reopening. We are fortunate at Veridify Security to have…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.