Vendor Assessment: Veridium

How To Kill The Password

A Buyer’s Guide To Passwordless Authentication Technology

Last Updated: 12 October 2021

Document Id: tch-vendor-assess-veridium

Company Key Facts

Web: https://www.veridiumid.com/
LinkedIn: https://www.linkedin.com/company/veridium/ 
Twitter: https://twitter.com/veridiumid 
YouTube: https://www.youtube.com/channel/UCQJ0qSdVUzhHGW6QD7qzrTw/videos 
Founded Date2016
Executive TeamTodd Shollenbarger (Chairman), Ismet Geri (CEO), Baber Amin (COO), John Callahan (CTO)
No. of Employees~50
Total Funding$16.7 million
LocationsUK (London, Oxford), USA (New York), Romania
In Their Own WordsYour Partner for Passwordless Authentication

Veridium envisions an authentication experience where your digital identity should fundamentally be similar to your innate identity and enables modern, passwordless, omnichannel authentication for employees, customers and transactions.
To fulfill this vision we built the most comprehensive Integrated Identity Platform powered by AI-based Behavioural Biometrics, enabling Multi Factor Authentication, digital ID verification and a true passwordless experience.

Funding

Announced Date Transaction Name Number of Investors Money Raised Lead Investors 
Jun 29, 2018Series B – Veridium3$16.5MMichael Spencer
Jun 22, 2018Grant – Veridium1$150KDFS Lab

Veridium has received over $16 million in total funding.  Their series B in June 2018 was led by Michael Spencer.

Source: Crunchbase

Customer Case Studies

CustomerRegion / SectorDetails
AnnieCannonsUS / Non-profitAnnieCannons provides technology support services for a range of non-profit initiatives.  They leverage the Veridium technology to support application and infrastructure services for a human trafficking victim support programme.  They built an application that leveraged Veridium components to allow for privacy preserving secure biometric enrollment for victims, in order for them to access services such as healthcare and shelter.
Impact: Secure proofing / Privacy preserving biometrics / Reduced manual processing of applications / Simplified access to resources – Further details.
Cuy MovilPeru / TelcoCuy Movil is a leading mobile telecommunications provider in Peru.  They were seeking a method to biometrically authenticate new SIM card users during enrollment.  An investigation into leveraging physical scanners in-store was too expensive, time consuming to use with a large implementation cycle.  Cuy Movil leverages the Veridium 4 Fingers biometric solution to securely enroll and authenticate new users.  The process leverages the existing on-mobile camera to take a picture of their “4 fingers”.
Impact: Streamlined enrollment / Cheaper and more effective biometry than hardware / Rollout without requiring new staff or hardware – Further details.
Dubai Islamic BankPakistan / BankingDIB is one of the leading islamic banks in Pakistan.  They leveraged existing hardware based fingerprint scanners for in branch customer authentication.  These devices were coming to the end of their service life and needed replacing.  DIB leveraged Veridium 4 Fingers biometric solution along with their SDK to build a new DIB mobile banking application.
Impact: Huge cost savings in hardware biometric replacement / Regulatory compliant / Streamlined experience – Further details.

Technology Key Facts

Go To Market Message“We strive for a passwordless world” – based on identity verification that is simple and effective to use.
SolutionsWorkforce authentication / Consumer authentication / Identity verification
Products / PlatformComposer / InMotion Behavioural Biometrics / 4Fingers / vFace / SDK
Useful LinksCase Studies DirectoryData Sheet DirectoryVideo Directory

Technology Review

Veridium provides a range of biometric centered passwordless authentication solutions, including proprietary components for both fingerprint scanning and facial recognition.

With such a strong focus upon biometric authentication, they have several case studies showing support for large scale hardware biometry replacement – specially for the likes of hardware based fingerprint scanners.

They have a strong patent history associated with biometric technology.

Whilst they provide solutions for both the workforce and consumer user groups, they also provide a range of identity verification capabilities too – enabling subsequent authentication events to be tied back to a real identity of known origin.

They provide a narrative based upon the “enterprise dilemma” – where organisations have multiple identity providers and numerous multi factor authentication providers that all require integration and projects to justify a return on investment.  Whilst usability is a key end user concern, Veridium also focuses upon usability for administrators too – with their composer product helping to integrate and manage components seamlessly.

Workforce Authentication

Veridium provides a range of authentication options for the modern and complex enterprise.  They have a range of integration options from the likes Windows and virtual desktop infrastructure through to the replacement of existing hardware based MFA components.

One of their go to market straplines is “Windows Hello” without “Windows” and without “Hello” – that is delivering a well known and successful passwordless authentication experience to a range of systems, not just Microsoft based.

Customer Authentication

Customer authentication for Veridium very much focuses on replacing some of the existing approaches to secure MFA such as tokens and hardware fobs.

Many organizations, specifically within the financial services arena, would leverage OTP (one time password) based authentication fobs for authentication and high risk transactions.  These can be expensive to maintain and do not necessarily provide long term agility.  

Veridium aims to reduce the operational cost of such use cases by replacing hardware with existing technology – namely the customer’s mobile device, coupled with a mobile application using the Veridium SDK to provide secure biometric authentication and enrollment.

Veridium also provides a narrative around the modern customer experience requiring an omnichannel experience – that is authentication services that are consistent across web, call centre and mobile technology groups.

They also seemingly target regulated industries – by allowing biometric data to be handled in a privacy preserving manner.

Identity Verification

Identify verification to Veridium is very much focused on the secure biometric enrollment of end user data, that is technically equivalent and sometimes compatible with, existing biometric systems based on the fingerprint.

Their 4Fingers proprietary biometric solution can provide compatibility with existing fingerprint databases such as NADRA (Pakistan’s National Database and Registration Authority), RENIEC (Peru’s National Registry of Identification and Civil Status) and AADHAAR (Unique Identification Authority of India).  

Not only is this being used for KYC (know your customer) style use cases, it is also being used by national government and law enforcement agencies.

Veridium ID Platform

The ID Platform is Veridium’s approach to providing a centralized set of MFA capabilities that can be abstracted from the underlying identity provider and application services that require biometric authentication.

Organizations – especially when focused on employee identity – will have a range of enterprise applications that require strong passwordless authentication.  The ID Platform claims to provide that integration option to identity providers, SaaS applications and legacy systems too.

The ID Platform provides an abstraction narrative that removes the authentication pressure from existing identity providers such as Okta, Ping Identity or ForgeRock.

Composer Orchestration Engine

Enterprise identity and access management is becoming ever more complex, with multiple authentication modals, data signals and integrated systems.  

The Veridium Composer is aimed at improving the usability for the administrator.  

This central console provides the ability to design user flows that help to augment existing and new data signals to allow consistent omnichannel authentication across different device types.

InMotion Behavioral Biometric

Veridium talks about proprietary biometric technology as one of their main unique selling points, with numerous case studies where a solution from an existing hardware biometric has been migrated to Veridium.  InMotion however aims to improve the typical OS lead native biometric services such as FaceId or fingerprint, by analysing behavioural characteristics at the same time they are being used – reducing the ability for biometric spoofing.  InMotion is their behavioural biometric engine.

How the end user holds their phone and interacts with the device for example is leveraged by using the “motion sensors” on the mobile.  The continued analysis of these interactions are monitoring when the biometric is taken in order to generate a risk score that can be used to determine whether step up authentication events are needed.

4Fingers

4Fingers is a proprietary biometric capability Veridium have designed to improve fingerprint based authentication.  The concept is to leverage the existing camera available in many mobile telephones.  

By taking a picture of the four fingers on each hand, the Veridium SDK can leverage this as a means to uniquely identify the end user, without the need for expensive hardware.  Fingerprint verification is a typical use case for financial institutions, as well government agencies and law enforcement.  4Fingers also provides support to match the captured templates with existing fingerprint databases for simpler migration and integration.

vFace

vFace is Veridiums second proprietary biometric capability.  vFace provides alternative ways to capture facial imagery away from the native mobile operating system.  The storage of the biometric data is also distributed – reducing a single attack vector on the device.  Veridium describes how they have the ability to essentially provide the Windows Hello capabilities to other non-Microsoft based services.

vFace uses a liveness check to provide robust protection against picture and video based spoofing attacks.  A mobile SDK and AI powered back end provides the infrastructure for deployment.

SDK

The Veridium ID app is available in both the iTunes and Google apps stores.  Many organizations of course want to develop their own applications.  Veridium provides an SDK to assist them in doing so for both the Android and iOS platforms.

Pre-requisites:

iOS

  • Operating system: 9.0 and above
  • Programming language: Swift or Objective-C
  • Hardware sensors: depending on the capabilities of the phone the SDK will use local biometrics such as TouchID or FaceID.
  • For the VeridiumID proprietary 4F biometry back camera permission is required.

Android

  • Operating system: 4.4.4 (API 19) and above
  • Programming language: Java 8 or Kotlin
  • Hardware sensors: depending on the capabilities of the phone the SDK will use local biometrics like Fingerprint or Face recognition.
  • For the VeridiumID proprietary 4F biometry back camera permission is required.

Sample Technology Integration Coverage

Single Sign On Identity Providers

  • Okta
  • ForgeRock
  • Ping Identity

Identity Verification

  • Jumio

Virtual Desktop Infrastructure

  • Citrix
  • IGEL

Cloud Infrastructure

  • AWS
  • Google
  • Microsoft

Hardware

  • FIDO/FIDO2

The Cyber Hut Comment

Veridium has a range of proprietary biometric capabilities that can assist in the deployment of secure multi factor enabled passwordless authentication.  Their case studies prove capabilities for the higher security use cases for financial institutions, government and law enforcement entities.  

The replacement of legacy hardware based biometric technology such as fingerprint scanners seems a sweet spot, with the lower cost and more agile deployment approach of the Veridium SDK and Veridium ID platform.

The focus on security usability for the end user is not new – but what Veridium are also doing is amplifying the usability for the designer or administrator of authentication solutions.  The complex hybrid nature of many enterprises is driving the need for more orchestration and the Veridium Composer seems to fit in that arena of improving the integrated and consolidated technology view when it comes to authentication.

Strengths

  • Strong directory of case studies
  • Over 50 patents for proprietary biometrics for face and fingerprint
  • Strong support for higher security use cases for government and law enforcement
  • Strong support for hardware fingerprint migrations
  • FIDO2 certified

Methodology

The Cyber Hut Vendor Assessments are always independent and free from vendor sponsorship.  We follow a 5 step process to create a body of knowledge that provides buyside decision makers with a tool that can assist with overcoming the information asymmetries often associated with vendor due diligence.

1 – OSINT

The first stage in the process is to leverage a range of open source intelligence data points (OSINT) to create an impartial and empirical view of the vendor, through their natural actions, talk tracks and observable data points.

We leverage free and paid for data sources to help understand the basic history and vision of the organization, as well as technical details that help to create a picture of capabilities, features and functions.  

This process takes between 2 and 4 weeks to complete and uses sources such as the following:

  • Crunchbase / Glassdoor
  • YouTube / Twitter / LinkedIn
  • Vendor Website
  • Vendor Webinars & Events
  • Vendor Whitepapers & Datasheets
  • Vendor Case Studies
  • Patent Search
  • Blogs
  • Documentation & Release Notes
  • APIs and SDKs
  • Downloads and Trials

2 – Vendor Briefings

After a basic dossier has been created, a reach out to a vendor is performed to arrange a briefing, pitch and demo and to answer any questions that may have been raised during the OSINT phase.

The briefings usually last about 60 mins and normally cover a general go to market pitch and position, followed by a secondary demonstration session by a sales engineer.  This process typically results in some further more technical questions that can be easily answered via email and existing documentation.

At this point, The Cyber Hut are in a position to start creating the first version of their Vendor Assessment.

This will take up to 2 weeks and will contain all the information gathered in the OSINT and vendor briefing stages.  Existing public case studies will also be analysed.

3 – Vendor Fact Check

Once the initial draft of the Vendor Assessment has been created, this is sent back to the vendor, to allow them to validate any technical points and “fact check” any information that has been documented.  The vendor typically responds within 14 days with any corrections and edits.

4 – Vendor Assessment Completion

After the vendor has been given the opportunity to fact check the assessment any corrections are incorporated into the final document.

At this stage, the document can be made available to buy side practitioners as a standalone artifact.  This is provided as a non-distributable PDF available in single-seat and enterprise-wide licenses.

Vendors may also purchase a redistributable version of the Vendor Assessment which they can use as marketing and pre-sales collateral for a 6 or 12 month period.

Methodology Benefits

The benefits to this approach are twofold:  firstly the vendor is not burdened with cumbersome questionnaires, normalised market requirements and time consuming templates.  The “heavy lifting” is performed by The Cyber Hut in order to provide a more empirical and evidence based assessment.

The vendor has full control over the ability to correct and fact check any written material, which validates the evidence that has been collected.

Secondly, The Cyber Hut does not place emphasis on the concept of “ranking” vendors and identifying “who is the best” in a particular segment, vertical or implementation.  

The Cyber Hut aims to produce impartial evidence based reports that help to bridge the supplier and buyer divide.

Vendor Assessments are typically re-evaluated every 12 months.

About The Author

Simon Moffatt is Founder and Analyst at The Cyber Hut.  Simon provides the overall strategy and content management, analysing unique positions with many different lenses. He is a published author and contributor to identity and security standards at the likes of NIST and the IETF.  He has a 20+ year career working within the identity & access management and cyber security sectors – for vendors, system integrators and within industry.  



Education

B.Sc (hons) Economics (York, 2001)

M.Sc Information Security (Royal Holloway, University of London, 2022)

Professional Memberships

MBCS – Member of the British Computer Society

F.CIIS – Fellow of the Chartered Institute of Information Security

Professional Qualifications

CISSP (Certified Information Systems Security Professional) – 2007 to present

CCSP (Certified Cloud Security Professional) – 2020 to present

CEH (Certified Ethical Hacker) – 2018 to present

CISA (Certified Information Systems Auditor) – 2010 to 2014

Research Interests

Distributed Authorization; Cyber Strategy; Security Economics; Identity Counter Measures; Nation State Cyber Strategy

Disclaimer

© 2021 TCH Research Ltd.  All rights reserved. The Cyber Hut is a trading name of TCH Research Ltd.

This publication may not be reproduced or distributed in any form without The Cyber Hut’s prior written permission. It consists of the opinions of The Cyber Hut’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, The Cyber Hut disclaims all warranties as to the accuracy, completeness or adequacy of such information. 

The Cyber Hut does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by The Cyber Hut’s Usage Policy. 

The Cyber Hut prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party.

Categories:

Tags:

Signup for New Content Updates