• VeriClouds Credentials Verification Service

CrediVerify™: Detect. Verify. Prevent.

VeriClouds CredVerify - image api on https://www.vericlouds.com

CredVerify™ Cloud API

CredVerify™ integrates with IAM systems and complements existing authentication and MFA. The integration detects compromised credentials of your employees or customers during authentication by checking their credentials against a database of more than seven billion compromised credentials.

Download VeriClouds Whitepaper

VeriClouds CredVerify - image technology2 on https://www.vericlouds.com

CredVerify™ On-Premise Service

CredVerify™ deploys as a hardware appliance on your network without any connectivity to the outside. The appliance stores billions of encrypted compromised credentials and is equipped with a hardware-based security - Intel® SGX or SafeNet's HSM for superior data-privacy and compliance.

Download Intel® SGX Brief

VeriClouds CredVerify - image web2 on https://www.vericlouds.com

Privacy & Security

CredVerify™ protects your data by using encryption and masking at all times. The credential verification happens locally on your network using Intel® SGX secure enclave. CredVerify™ uses only strong encryption to prevent tampering with potential PII and abuse by rogue admins or malicious users.

Security by Design with Intel® SGX

VeriClouds CredVerify™ with Intel® SGX enables enterprises to detect compromised credentials with privacy protected by design. The protection of the credential verification process with Intel® SGX, when hardware appliance used, helps defend against internal and external attackers, including malware running on the host machine and malicious/insecure cloud providers.

Download Intel® SGX Brief
VeriClouds CredVerify - image intel-partner-e1510333849338 on https://www.vericlouds.com
VeriClouds CredVerify - image NIST_Vector on https://www.vericlouds.com

NIST Password Compliance Check

VeriClouds CredVerify™ helps enforce the NIST password requirement guidelines for IdPs by screening of new passwords against lists of commonly used or compromised passwords. The types of lists recommended by the NIST 800-63b, sec 5.1.1.2 Memorized Secret Verifiers guidelines include:

  • Passwords obtained from previous breach corpuses
  • Dictionary words
  • Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’)
  • Context-specific words, such as the name of the service, the username, and derivatives thereof

VeriClouds CredVerify - image woman2 on https://www.vericlouds.com

Improve Visibility of User-Centric Risk with CredVerify™

Organizations who use CredVerify are able to:

  • Block stolen credentials from being used during logon
  • Outsource legal liabilities of handling breached data
  • Automate response and remediation to known data breaches

Request Trial