Analysis of online account credentials linked to employees of Fortune 500 companies

Fortune 500 companies are the backbone of our economy. They employ over 27 million people. VeriClouds research team investigated the leaked online account credentials belonging to the employees of the 2017 Fortune 500 companies where an email address was used to set up an account. The number of leaked online accounts is considered a cyber […]

Read More

Solution Brief: VeriClouds CredVerify Uses Intel® Software Guard Extensions (Intel® SGX)

VeriClouds is focused on minimizing the threat of data breaches through stolen credentials; Intel® SGX is a great solution for enhancing customer security and privacy -Rick Echevarria, Vice President, Software and Services Group and General Manager, Platforms Security Division, Intel CorporationPrivacy By Design with Intel SGX CredVerify architecture enhances privacy of the sensitive credential data […]

Read More

Executive View: Kuppinger Cole Executive View – VeriClouds CredVerify

CredVerify service is unique in what it offers. -Mike Small, KuppingerCole AnalystSecurely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance. There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers. In this Kuppinger Cole Executive […]

Read More


VeriClouds Whitepapers & Resources Below you will find links to our whitepapers, checklists, and other valuable documents. Documents Whitepaper 5 Key insights for Credential Monitoring and Verification The 5 insights that matter when selecting the most adequate solution for mitigating the risk of data breaches with leaked credentials Download Document Report Leaked online account credentials […]

Read More

Whitepaper: Protect Sensitive Data and Prevent Account Takeover with Compromised Accounts Detection “as a Service”

“81% of confirmed data breaches involved weak, default or stolen passwords.” 2017 Data Breach Investigations Report, Verizon With such large-scale breaches becoming commonplace, it is more important than ever to work with the best threat intelligence sources proactively and decisively, particularly when compromised credentials are detected in your customer or employee directories. In this whitepaper, […]

Read More

We Accept Only Business Email Addresses – No Free or ISP Email Addresses

Please enter a business email address to obtain proper delivery of the product. If you do not have a business email address or experience any issues during the registration process, please send an email to