How does the service work?
Veronym is a cloud-based cybersecurity service "Made in Germany". It is based on market-leading, cutting-edge technologies, which are fully automated and perfectly coordinated. We combine next generation endpoint protection with market-leading Internet protection. Attacks are detected early and automatically blocked; if an attacker should nevertheless succeed in compromising a device, we use modern analysis methods to detect undesirable behavior and alert our customers in a timely manner.
Do I need to hire an IT specialist who will manage the Veronym system?
Veronym is a Managed Security Service. During the development "simplicity" was the basic principle. Therefore users don’t need expert knowledge to install the service and protect their devices.
Once Veronym's software is installed, do I need to configure anything on my device (laptop/mobile/server)?
No, the device is comprehensively protected immediately after installation.
Which operating systems does Veronym support?
Veronym supports the most popular operating systems for PC (macOS, Microsoft Windows) and mobile devices (iOS, Google Android).
For detailed information, please contact our support: firstname.lastname@example.org
What is needed to start using Veronym’s service?
You need a device connected to the Internet and running an operating system supported by Veronym. Device protection works also offline.
What about SLAs and the topic of data processing or GDPR?
There are relevant documents containing all details on our website www.veronym.com, including Terms and Conditions, Service Contract, Service Package, Order Agreement.
What does the user's account look like?
There are two kinds of Veronym accounts. The Master Account is used for device management, billing and reporting. The individual device accounts are then created for individual devices and managed by the Master Account.
How many Master Accounts are there? Can I have several Master Accounts?
Each customer has one Master Account. This account is used to manage subscription (upgrade/downgrade plans and add-ons), payment details, billing address and the cancellation of the subscription as well as the device accounts.
How many device accounts can I add to my Master Account?
Veronym is a device-based service. You can add an unlimited number of devices in Veronym Customer Portal. You will be charged for each device added to your Master Account, according to the selected service.
Do we protect servers as well?
We protect Windows servers.
When the customer uses both components (Veronym Internet, Veronym Device) is there any need for external virus scanners (Kaspersky, Norton or AVG)?
No, an essential component of Veronym is market-leading device protection with next-generation antivirus technology.
How does the service work?
Can I upgrade or downgrade my subscription anytime?
Subscription to Veronym solution is a pay-as-you-go service. In the case of a monthly settlement, you can upgrade, downgrade or cancel at any time. In the case of an annual settlement, you can upgrade at any time but downgrade or cancel after the full year of subscription.
What are the notice periods?
Till the end of the month, with monthly payment. One month before the end of the entire subscription year, for annual payment.
Are there any cancellation fees?
No. Veronym is a pay-as-you-go service. We do not have any cancellation fees. If you cancel, you’ll be billed for the current month, but you won’t be billed again.
What types of payment do you accept?
Currently, we only accept bank transfer. All of our payments follow EUR pricing.
Can I close a device account?
Yes. Our clients can name an account which we will deactivate on their behalf.
Can I choose different price plans for different users under one Master Account?
Yes. You can put an order for the number of devices and price plans of your choice through Veronym Customer Portal.
Where can I find out more information on how to install Veronym on my device?
Our installation manuals can be downloaded for free from Veronym User Portal. They provide all the necessary information about the installation process and system requirements for installing Veronym's service.
Does the trial cost anything and how long can I test?
The trial is free of charge and lasts 14 days.
How does the 14-day free trial work?
Full Veronym protection is effective from day one. You will receive an accessible report every 7 days by e-mail and you can check dashboards with detailed data on the Customer Portal at any time during the trial.
Do I have access to a management interface and can I still "set" or "change" something or do I have administrative rights?
No, this is a fully managed service. Clients don't have access to the management interface, where network inspection rules can be changed. Policies can be customized through Veronym Professional Service in "Ultimate" Package.
Do I also have "offline protection"? Is the protection of my device guaranteed even without an active connection to the Internet?
Veronym Device contains all necessary prevention technologies to protect your device, both when it is online and offline. These technologies include machine learning to protect against unknown and zero-day malware, exploit and hash blocking.
What does Veronym customer service look like?
Our customer service is available by telephone during our office hours at 0049 (0)30 54621033 and by e-mail - email@example.com.
What does the reporting look like?
Every 7 days you will receive an accessible report containing information about attempted and blocked attacks as well as statistics regarding the entire service.
Is IP telephony a problem if we route all traffic over Veronym Internet Service?
There is no problem with this.
What is the scalability of Veronym service?
Our service is self-learning and reacts automatically to capacity spikes. The service is available worldwide and the connection to the nearest Veronym Security Hub is automatic.
Will any notifications appear as the service is scaled?
No, our clients will not receive any information about it.
Do I need to install an application on my device?
Yes. For mobile devices, the agent is an app that is downloaded from the respective store (Apple/Google) and for desktops - from Veronym User Portal.
How will I know that the security application is on?
In the case of Internet Security the taskbar shows an icon with the connection status. This connection should always be active. After turning the device on and logging into the desktop in the case of computers, the user will have an automatic connection in the background. Device Security, on the other hand, is invisible.
Does the Veronym service slow down devices?
The traffic generated by devices is inspected in Veronym's cloud service. Thanks to this, traffic is thoroughly scanned and the system is flexible, efficient and resistant to failures. Veronym Device Security runs locally in the background on the device and differs from conventional antivirus programs in terms of performance - mainly by very low resource use. The service has a minimal impact on the performance of the end user's working environment and in most cases is unnoticeable.
Does the number of open pages and bookmarks affect the speed of the service?
It doesn’t affect the speed.
What happens if one of my employees generates infected content?
The EDR (Endpoint Detection and Response) functionality protects against this kind of attacks; it is available in Veronym Device Pro and Advanced Package.
Is it possible to circumvent Veronym’s security?
This is quite unlikely, as we are using a multi-layered defence model which is made up of different technologies. To succeed, an attacker would have to compromise all levels of defense simultaneously.
Do I have to update the service after purchase?
Regular updates of security agents are not required for the service to remain effective (as opposed to classic, signature-based solutions).
Is the service developed after purchase?
An essential factor for consistent security is a rapid and continuous update of the technologies used. It is important to ensure that all dependencies and transfer interfaces remain intact. Our service is continuously updated and extended using new security technologies. However, the price of our services remains the same. We will inform you regularly about new technologies and additions to our portfolio.
Will Veronym see what I do on my device?
We are focused strictly on detecting and blocking threats. Veronym Security Service sees metadata (traffic data) of the device and checks incidents related to security breaches.
Does Veronym have access to my data?
We inspect activities in the background to detect threats in the traffic. Veronym does not read the content of the data, we neither save it nor process it. The only data at our disposal are security incidents, which generate logs. These security logs provide full insight for reports and protect other users from similar threats. Veronym sees IP addresses, source, destination and general information about data packets. However, we do not see the application content and identities of the users behind these connections.
Is it possible, if needed, to customize FW rules through Veronym?
This is possible in the Ultimate package.
Can the customer report be "adapted" or customized by the customer?
This is possible in the Ultimate package.
Why doesn't Netflix work when the protection is on?
Netflix and a number of other streaming sites block visitors using VPNs due to their strict licensing regulations. See information from Netflix Help Center below (https://help.netflix.com/en/node/54085):
If you experience the error code F7111-5059 (or similar) on your computer, it indicates that our systems have detected that you are connecting via a VPN, proxy, or "unblocker" service. Because our content library can vary by region and these types of connections are frequently used to bypass geolocation methods, you will not be able to stream when connected in this way. (...) Because there is no reliable way for us to determine if a VPN or proxy is being used for legitimate purposes, any VPN or proxy use will prevent you from streaming Netflix. Please disable any VPN or proxy and try Netflix again.
What is Veronym Email?
Veronym Email is an email protection service based on Proofpoint Essentials solution, which is used by some of the world’s largest and most security-conscious companies. Our service offers advanced threat protection: spam and phishing detection, along with multilayered anti-virus protection. It also includes filter rules engine and email continuity with an emergency inbox.
How does Veronym Email stop spam, phishing and other email-based threats?
Veronym Email is powered by Proofpoint MLX technology - spam and phishing detection, which examines hundreds of thousands of attributes in every email. It detects text, image and attachment-based spam or phishing emails and automatically adapts to new threats as they appear. Additionally, URL Defense and Attachment Defense effectively detect, catch and analyze the malicious URLs and attachments that target your organization. All messages are also scanned by antivirus to ensure that all viruses are captured and blocked.
Does the solution provide outbound protection?
Yes, the Outbound filtering feature ensures all your outbound emails are free from viruses, malware and other malicious content.
What happens when my mail server goes down?
Veronym Email ensures that your business email is always running. It provides you with an emergency inbox, instant replay of lost or deleted emails over the last 30 days, and email spooling.
Is there any limit to the size of the email attachments that can be scanned?
Veronym Email supports email attachments up to 150MB in size by default.
How to start using Veronym Email?
To purchase Veronym Email register in Veronym Customer Portal and after successful registration go to Subscription > Order > Buy and choose how many emails you would like to protect (1 email = 1 subscription). Once your order is completed, contact us at firstname.lastname@example.org - our Support will assist you with the implementation process (Veronym Email needs to be integrated with your email service to operate).