Veridium Resource Library

Read more about our solutions and what sets Veridium apart.

Datasheet

Veridium Solutions Overview

Protect your data, employees, and customers with biometric authentication. Learn more about our proprietary solutions: VeridiumID, VeridiumAD, and 4 Fingers TouchlessID.
Download
Datasheet

VeridiumID

Safeguard your data by proving identity with a flexible, secure, and enterprise-ready platform. Learn more about our multi-factor biometric authentication end-to-end solution.
Download
Video

VeridiumID in Action

See how VeridiumID can be used in place of traditional passwords for opening door to authenticating high value stock trades.
Watch
Video

VeridiumID for PINless ATMs

Cards and PINs are key weaknesses in banking security. With card skimmers, thieves can collect data from the magnetic stripe of a credit, debit, or ATM card. Eliminating cards and PINs and replacing them with biometric authentication can make ATMs safer to use. See VeridiumID in action.
Watch
Video

VeridiumID for eCommerce

Billions of people shop online, but more than 68 percent of online shoppers abandon their shopping carts every day, many because they forgot their password. With biometrics you’ll never forget your password because you are your password.
Watch
Video

VeridiumID for Healthcare

Replacing passwords with biometrics will ensure secure yet convenient access to health and insurance records, and provide true identity authentication, so that only you, your doctor, and other authorized healthcare workers have access to them.
Watch
Video

VeridiumID for Physical Access

From vaults to opening doors in remote branch locations, banks are looking for solutions that can better secure physical assets. Swipe cards, keys and PIN codes are too easily lost or stolen.
Watch
Video

VeridiumAD

VeridiumAD is an enterprise-ready solution that adds biometric authentication to Microsoft Active Directory environments. It’s extremely flexible, and can be deployed to replace traditional passwords with multiple biometric options. Watch it in action.
Watch
Video

VeridiumID

Everyone acknowledges that passwords are a weak link in enterprise security. You can lose them, share them, and crack them. Biometrics can strengthen legacy systems by adding an additional layer of security. See VeridiumID in action.
Watch
Infographic

Identity Through The Ages

Veridium is all about verifying identity, but before we can explore that process, we need to understand what identity is in the first place. This infographic explores society's definition and understanding of the concept of identity throughout history.
View
Datasheet

VeridiumAD

Increase the security and convenience of Microsoft Active Directory access by replacing passwords with biometric authentication. Learn more about our VeridiumAD connector.
Download
White Paper

Keeping Your Data Safe in an Unsafe World

As more of our lives go digital it is increasingly difficult to keep our private data safe and secure. Passwords can easily be hacked, but while newer identity authentication methods like biometrics are becoming more mainstream, people still rely on outdated passwords.
Download
Datasheet

4 Fingers TouchlessID

4 Fingers TouchlessID is an innovative new biometric that captures four prints simultaneously, giving unprecedented levels of security, reliability, and convenience.
Download
White Paper

Multi-Factor Authentication: The Path Forward for Security

The question for businesses is no longer “will we get hacked," but “when will we get hacked, and how will the attackers gain access?” We can’t answer when, but we can look at the how and examine fixing these problems by eliminating passwords.
Download
Infographic

10 Most Significant Hacks Since 2010

Over the last five years the scope and significance of cyberattacks has grown exponentially. From massive breaches at some of the world’s leading retailers to numerous attacks on Sony, these hacks have, and will continue to have, a lasting impact on how consumers and enterprises handle cybersecurity. We haven’t seen the end of these attacks either, with the potential for a foundation-shaking “megahack” increasing every year.
View