Veridium References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1172)
    Verified30+ References
  • 4.8 / 5.0 (839)
    20+ References
  • 4.8 / 5.0 (1636)
    Premium33+ References

Veridium Testimonials

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References30 total
    About

    Axiad provides comprehensive credential management systems that secure digital identities across users, machines, assets, and interactions for enterprises and public-sector organizations. Axiad helps customers maximize their cybersecurity investments by enhancing their existing IAM tools. This simplifies the management of disparate IAM solutions that need to work in cloud-based, on-prem, or hybrid infrastructures while ensuring compliance with standards like FedRAMP and CMMC. Axiad customers benefit from lower IT costs, enhanced user satisfaction, and fortified IAM processes that can withstand modern identity-based attacks.

  • Reference Rating
    4.7 / 5.0
    Customer References20 total
    About

    Beyond Identity is the first and only company to provide passwordless identity management. The Beyond Identity team is composed of cybersecurity and identity management professionals who are passionate about restoring digital trust and building a fundamentally secure way to authenticate and authorize users while protecting privacy.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked