VeriClouds Whitepapers & Resources
Access a wealth of cybersecurity resources, including whitepapers, datasheets, and case studies
Documents


Whitepaper
Assessing The Risk of Compromised Credentials to The Enterprise
Provides methodology for assessing and scoring compromised credentials risk and aligns it to the overall cybersecurity and operational risks.
Download Document
KuppingerCole Report
Executive View VeriClouds CredVerify
Analyst Mike Small from KuppingerCole provides his opinion on the VeriClouds CredVerify™ service.
Download Document
Whitepaper
5 Key insights for Credential Monitoring and Verification
The 5 insights that matter when selecting the most adequate solution for mitigating the risk of data breaches with leaked credentials.
Download Document
Checklist
5 Ways to Mitigate Account Takeover Attacks based on industry’s practices
The checklist was compiled based on the security practices of leading technology companies.
Download Document
Report
Leaked online account credentials of Fortune 500 Companies
Provides information about the leaked online account credentials of the Fortune 500 companies and compares different industries and sectors.
Download Document
Whitepaper
Compromised Accounts Detection "As-a-Service"
Explains the cybersecurity risk of compromised credentials and suggests different methods to mitigate the risk.
Download Document
Intel® Solution Brief
VeriClouds CredVerify Uses Intel® Software Guard Extensions (Intel® SGX)
VeriClouds CredVerify uses Intel® Software Guard Extensions (Intel® SGX); Credential verification with privacy by design.
Download Document