Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

IoT Security Update: September 2020

Veridify Security News Welcome to the September issue of our IoT newsletter. In this issue, we are debuting a shortened and more concise format based on feedback from our readers. This summer, our team has been extremely busy working on some exciting technology developments in our DOME platform for managing very low-resource devices found in…
Read More

IoT Security Update: July 2020

Veridify Security News Welcome to the July issue of our IoT newsletter.  We hope this email finds you and your families able to enjoy some safe and healthy summer activities despite the persistence of coronavirus in some parts of the world. This summer, our team has been extremely busy working on some exciting developments in…
Read More

Ripple20 Vulnerabilities from Louis Parks, Veridify Security Chairman and CEO

For anyone who follows security and the IoT, the recently identified “Ripple20” vulnerabilities revealed by the Israeli firm JSOF will not be a surprise. However, as the number of connected devices continues to grow exponentially, what these recent flaws dramatically showcase is the extent to which we are becoming reliant on IoT devices in both…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.