Veridium Resource Library

Read more about our solutions and what sets Veridium apart.

Video

VeridiumID for Physical Access

From vaults to opening doors in remote branch locations, banks are looking for solutions that can better secure physical assets. Swipe cards, keys and PIN codes are too easily lost or stolen.
Watch
Video

VeridiumAD

VeridiumAD is an enterprise-ready solution that adds biometric authentication to Microsoft Active Directory environments. It’s extremely flexible, and can be deployed to replace traditional passwords with multiple biometric options. Watch it in action.
Watch
Video

VeridiumID

Everyone acknowledges that passwords are a weak link in enterprise security. You can lose them, share them, and crack them. Biometrics can strengthen legacy systems by adding an additional layer of security. See VeridiumID in action.
Watch
Infographic

Identity Through The Ages

Veridium is all about verifying identity, but before we can explore that process, we need to understand what identity is in the first place. This infographic explores society's definition and understanding of the concept of identity throughout history.
View
Datasheet

VeridiumAD

Increase the security and convenience of Microsoft Active Directory access by replacing passwords with biometric authentication. Learn more about our VeridiumAD connector.
Download
White Paper

Keeping Your Data Safe in an Unsafe World

As more of our lives go digital it is increasingly difficult to keep our private data safe and secure. Passwords can easily be hacked, but while newer identity authentication methods like biometrics are becoming more mainstream, people still rely on outdated passwords.
Download
Datasheet

4 Fingers TouchlessID

4 Fingers TouchlessID is an innovative new biometric that captures four prints simultaneously, giving unprecedented levels of security, reliability, and convenience.
Download
White Paper

Multi-Factor Authentication: The Path Forward for Security

The question for businesses is no longer “will we get hacked," but “when will we get hacked, and how will the attackers gain access?” We can’t answer when, but we can look at the how and examine fixing these problems by eliminating passwords.
Download
Infographic

10 Most Significant Hacks Since 2010

Over the last five years the scope and significance of cyberattacks has grown exponentially. From massive breaches at some of the world’s leading retailers to numerous attacks on Sony, these hacks have, and will continue to have, a lasting impact on how consumers and enterprises handle cybersecurity. We haven’t seen the end of these attacks either, with the potential for a foundation-shaking “megahack” increasing every year.
View
Webinar

The Password Is Dead: An Argument for Multi-Factor Biometric Authentication

From a lack of user adoption to actual flaws in security infrastructure, businesses need a better option to protect their most important resources. In this webinar, Veridium's CTO John Callahan discusses how passwords and two-factor authentication fall short, and how biometrics fill that void.
Register
White Paper

Proving Identity

Anonymity has been the biggest boon, and curse, of the Internet. Because no one truly knows who you are online, businesses can never be sure who is accessing their systems. Until now. Biometrics are changing how identity works in the digital age to achieve true identity assertion.
Download
White Paper

Top 5 Questions to Ask Before You Deploy Biometrics

No two businesses are like, and no two biometrics solutions are the same. To ensure you’re investing in a biometric platform that fits your company’s unique demands, it's important to answer a few questions to make sure the solution meets the security needs of your team.
Download
Datasheet

VeridiumAD is Citrix Ready

VeridiumAD seamlessly integrates with Citrix XenApp, XenDesktop, NetScaler, and Citrix Cloud to provide biometric authentication into any Citrix environment.
Download
Datasheet

4 Fingers Export SDK

Capture four fingers at once on a mobile device to match against legacy fingerprint databases and eliminate the need for expensive flatbed scanners and additional hardware.
Download
Datasheet

User Behavior Analysis (UBA)

VeridiumID captures user behavior on their smartphones, including how they tap, swipe, type, or hold their device, to improve security and minimize the risk of spoofing.
Download