VeriClouds Whitepapers & Resources

Below you will find links to our whitepapers, checklists, and other valuable documents.

Documents

Resources - image vericlouds-compromised-account-detection-whitepaper on https://www.vericlouds.com

Whitepaper

Compromised Accounts Detection "as-a-Service"

With such large-scale breaches becoming commonplace, it is more important than ever to work with the best

Download Document
Resources - image kuppingercole-executive-view-vericlouds on https://www.vericlouds.com

KuppingerCole Report

Executive View VeriClouds CredVerify

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can

Download Document
Resources - image Intel-SGX-Vericlouds-Solution-Brief on https://www.vericlouds.com

Intel® Solution Brief

VeriClouds CredVerify Uses Intel® Software Guard Extensions (Intel® SGX)

CredVerify architecture enhances privacy of the sensitive credential data at the design level. With the

Download Document
Resources - image VeriClouds-Datasheet on https://www.vericlouds.com

VeriClouds CredVerify

Datasheet

VeriClouds CredVerify™ is a credential verification service that helps organizations detect

Download Document
Resources - image VeriClouds-Checklist on https://www.vericlouds.com

Checklist

5 Ways to Mitigate Account Takeover Attacks based on industry’s practices

This checklist was compiled based on the security practices of leading companies, such as Google, Amazon,

Download Document
Resources - image VeriClouds-Self-Check on https://www.vericlouds.com

Self-Check

Your leaked credentials on the dark web

Check leaked passwords in data breaches. Search by an email address or a domain

Self-Check Now

Webinars

Enhance Privacy and Security with Integrated IAM

Enhance Privacy and Security with Integrated IAM

Presented by Stan Bounev. Viewers can learn how privacy and security are not only enabled by, but become more powerful through integration with modern IAM.

Resources - image secure-organizations on https://www.vericlouds.com

How Secure Organizations Have Their Accounts Compromised

In this talk, you will learn how attackers are able to compromise accounts of secure organizations which do not have vulnerabilities.