Authentication and Data Protection
for the Internet of Things

We provide public-key (asymmetric) security for low-resource devices. Our ultra-low-energy, fast, and small-footprint solutions are ideally suited for 8-, 16-, and 32-bit processors.

Ripple20 Vulnerabilities from Louis Parks, Veridify Security Chairman and CEO

For anyone who follows security and the IoT, the recently identified “Ripple20” vulnerabilities revealed by the Israeli firm JSOF will not be a surprise. However, as the number of connected devices continues to grow exponentially, what these recent flaws dramatically showcase is the extent to which we are becoming reliant on IoT devices in both…
Read More

IoT Security Update: June 2020

Veridify Security News To our valued customers and partners around the world – we hope this email finds you and your families safe and healthy during this unprecedented health crisis and the recent political unrest around the country. Here in Connecticut (U.S.), the state is gradually reopening. We are fortunate at Veridify Security to have…
Read More

IoT Security Update: January 2020

Veridify Security (formerly SecureRF) News 2019 was an eventful year filled with progress for our company. On December 4, 2019, SecureRF became Veridify Security, a name that better reflects our company’s expanding role in security for the IoT, automotive, smart building, device management, and secure supply chain markets. In describing the name change, Veridify CEO…
Read More

Prepare for a Post-Quantum World

If you are designing solutions that will be in the field for extended periods of time, then you need to consider the current development of quantum computers that will break popular security methods like ECC and RSA. Veridify’s public-key protocols, based on Group Theoretic Cryptography, are quantum-resistant to all known attacks.