Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

IoT Security Update: December 2020

Happy Holidays from Veridify Security We wish you a healthy and productive holiday season, and look forward to continued collaboration with our customers, partners, and industry contacts in 2021. In the spirit of giving and keeping with our annual holiday tradition, we’ve made a donation to St. Jude’s Children’s Research hospital. View more information about St.…
Read More

IoT Security Update: September 2020

Veridify Security News Welcome to the September issue of our IoT newsletter. In this issue, we are debuting a shortened and more concise format based on feedback from our readers. This summer, our team has been extremely busy working on some exciting technology developments in our DOME platform for managing very low-resource devices found in…
Read More

IoT Security Update: July 2020

Veridify Security News Welcome to the July issue of our IoT newsletter.  We hope this email finds you and your families able to enjoy some safe and healthy summer activities despite the persistence of coronavirus in some parts of the world. This summer, our team has been extremely busy working on some exciting developments in…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.