How Peru’s National Police used Veridium at the Pan American Games

By Fred O'Connor | September 26, 2019
To help keep 420,000 spectators, athletes and coaches safe during the 2019 Pan American Games in Peru, the country’s National Police conducted random security screenings in Lima, where the games were held. The security screenings, which occurred around the city and near venues that held the Games’ events, were used to deter criminal activity.  In […]
Read More

A smarter way to Know Your Customer

By Jason Tooley | September 24, 2019
In a fast evolving landscape where fraud and cyberattacks have hit an all-time high, one of the biggest issues now facing companies is how to verify customers in the most secure and seamless fashion. In response, many are now turning to more innovative methods of customer authentication such as biometrics. Amidst ever-rising fraud and data […]
Read More

How eliminating passwords improves the authentication experience for employees (and boosts productivity)

By Fred O'Connor | September 19, 2019
Employees face a less-than-stellar experience logging in to the many applications they use. First, they have to create unique passwords for all the applications, cloud services and tools that they need. There’s a password for Salesforce, Dropbox, WordPress, HubSpot, Citrix, G Suite and the desktop, among the many other applications employees rely on. Then they […]
Read More

Happy customers without the overhead: How Cuy Móvil uses Veridium to streamline SIM card registration

By Fred O'Connor | September 18, 2019
Before Cuy Móvil could bring more affordable mobile phone plans to Peru, it needed to figure out how people could register the SIM cards they purchased from the mobile operator with government. To help combat fraud, federal law requires people to register their SIM cards either using their fingerprints or national identity number. Selling SIM […]
Read More

Why enterprises are interested in passwordless authentication

By Fred O'Connor | September 12, 2019
Everyone seems to want to stop using passwords. Security and IT professionals loathe them because they’re a key infiltration tool. Anyone who handles user experience dislikes passwords because they’re not very user friendly. Despite grumbling about passwords, they’ve been the main way we authenticate since the 1960s, mainly because no one has come up with […]
Read More

Passwords, employees and the battle for productivity

By Fred O'Connor | September 5, 2019
A productivity battle is being fought at offices everywhere. On one side is the user, who just wants to file that report or send that email. On the other, is the authentication process that requires using a password to log in to the many tools and services employees need to complete their jobs.A password is […]
Read More

What is a digital ID?

By Fred O'Connor | August 29, 2019
Digital IDs can be authenticated over digital channels, unlike paper-based forms of identification such as driver’s licenses, passports and Social Security cards. Authentication can be carried out using tokens, PINs, passwords or biometrics. Digital IDs can be used to access banking, government, education and other services. The risk of using digital IDs for fraud and […]
Read More

What the Citrix, Veridium relationship means for Workspace customers

By Fred O'Connor | August 26, 2019
Providing Citrix customers with a better authentication experience is a key objective for Veridium. But how does Veridium’s passwordless authentication platform fit with Citrix’s customer strategy and how can Citirx customers benefit from using it? To better explain the Citrix and Veridium relationship, we talked to Veridium CRO Jason Tooley. Jason previously worked for Citrix […]
Read More

How Citrix Workspace users can adopt passwordless authentication

By Fred O'Connor | August 22, 2019
You’re back in the office after a holiday and actually looking forward to working. You open Citrix Workspace and are asked for a password. But you don’t remember it. Is it your dog’s name? The model of your first car? After multiple failed login attempts, you reset your password, a laborious process that entails contacting […]
Read More