Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

IoT Security Update: June 2021

As vaccine rates are climbing in the U.S. and the country is returning to pre-pandemic daily activities, the team at Veridify is preparing to reopen our Shelton, CT office to align with government guidelines and the comfort level of our team. We are pleased to see the announcement of several in-person tradeshows and events planned…
Read More

IoT Security Update: April 2021

We are excited to share that we have completed our site reviews for a proof-of-concept implementation of our DOME platform in a prime Midtown Manhattan commercial building. We’ve been closely collaborating with the building owner, the systems integrator, and our strategic technology partners, and are extremely excited about the value DOME delivers. We plan to…
Read More

Veridify DOME™ and Complying with US Federal IoT Cybersecurity Law from Derek Atkins, Veridify’s Chief Technology Officer

In December 2020, as the 116th Session neared its end, Congress passed H.R. 1668, the Internet of Things Cybersecurity Improvement Act of 2020, and the President signed it into law, Public Law 106-207 [Law]. The act’s primary objective is to establish minimum security standards for IoT devices owned or controlled by the Federal Government. It…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.