• VeriClouds Credentials Verification Service

CredVerify™: Detect. Verify. Prevent.

VeriClouds CredVerify - image api on https://www.vericlouds.com

CredVerify™ Cloud API

CredVerify™ integrates with IAM systems and complements existing authentication and multi-factor authentication. The integration detects compromised credentials of your employees or customers during authentication by checking their credentials against a database of more than eight billion compromised credentials.

Download VeriClouds Whitepaper

VeriClouds CredVerify - image technology2 on https://www.vericlouds.com

CredVerify™ On-Premise Service

CredVerify™ deploys as a hardware appliance on your network without any connectivity to the outside. The appliance stores billions of encrypted compromised credentials and is equipped with a hardware-based security - Intel® SGX or SafeNet's HSM for superior data-privacy and compliance.

Download Intel® SGX Brief

VeriClouds CredVerify - image web2 on https://www.vericlouds.com

Privacy & Security

CredVerify™ protects your data by using encryption and masking at all times. The credential verification happens locally on your network using Intel® SGX secure enclave. CredVerify™ uses only strong encryption to prevent tampering with potential PII and abuse by rogue admins or malicious users.

Security by Design with Intel® SGX

VeriClouds CredVerify™ with Intel® SGX enables enterprises to detect compromised credentials with privacy protected by design. The protection of the credential verification process with Intel® SGX, when the hardware appliance is used, helps defend against internal and external attackers, including malware running on the host machine and malicious/insecure cloud providers.

Download Intel® SGX Brief

VeriClouds CredVerify - image intel-partner-e1510333849338 on https://www.vericlouds.com
VeriClouds CredVerify - image NIST_Vector on https://www.vericlouds.com

NIST Password Compliance Check

VeriClouds CredVerify™ helps enforce the NIST password requirement guidelines for IdPs by screening new passwords against lists of commonly used or compromised passwords. The types of lists recommended by the NIST 800-63b, sec 5.1.1.2 Memorized Secret Verifiers guidelines include:

  • Passwords obtained from previous breach corpuses
  • Dictionary words
  • Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’)
  • Context-specific words, such as the name of the service, the username, and derivatives thereof

VeriClouds CredVerify - image woman2 on https://www.vericlouds.com

Improve Visibility of User-Centric Risk with CredVerify™

With CredVerify, your organization will be able to:

  • Block stolen credentials from being used during logon
  • Outsource legal liabilities of handling breached data
  • Automate response and remediation to known data breaches

Request Trial

We Accept Only Business Email Addresses – No Free or ISP Email Addresses

Please enter a business email address to obtain proper delivery of the product. If you do not have a business email address or experience any issues during the registration process, please send an email to support@vericlouds.com