Frequently asked questions

Requirements

Currently, Veronym is available for MS Windows, Mac OS, iOS and Android.

We want to secure all traffic that comes out of the user’s end device and goes to the Internet. One of the options offered as part of Veronym’s service is the end user device security system. This software is always active when the device is on. Customers do not need a direct Internet connection for the software to be active. Threats that flow from sources other than the Internet connection (for example; pendrives or shared folders in a local network) can be detected by an additional service that works even if the user is not connected to the Internet.

Veronym service is availabe for:

– iOS 10.0, iOS 10.1, iOS 10.2, iOS 11;

– Mac OS X 10.10, Mac OS 10.11, Mac OS 10.12, Mac OS 10.13;

– Google Android 4.4, Google Android 5.x, Google Android 6.x, Google Android 7.x, Google Android 8.x;

– MS Windows 7, MS Windows 8, MS Windows 8.1, MS Windows 10.

 

No search results.

First Steps

Veronym is a cloud-based security service. We provide a wide range of cutting-edge technologies, which are fully automated and perfectly coordinated. Our software runs seamlessly on all your devices, protecting everything that’s important for your business. Once Veronym’s software is installed on the user’s device, it provides a permanent connection to our environment – our secure cloud. All of your traffic is rerouted through the Veronym cloud, where our advanced analysis detects and blocks all security threats.

In order to get familiar with Veronym service you need to subscribe to a 14-day free trial period, available in each paid plan.

After you signup, you can access all the features available in selected price plan for 14 days. We want to make sure that you are completely satisfied with Veronym solution before you buy our cloud-based security service.

Subscription to Veronym solution  is a pay-as-you-go service. In the case of monthly settlement, you can upgrade, downgrade or cancel at any time. In case of annual settlement, you can upgrade at any time but downgrade or cancel after the full year of subscription.

No. Veronym is a pay-as-you-go service. We do not have any cancellation fees. If you cancel, you’ll be billed for the current month, but you won’t be billed again. 

Currently, we only accept a bank transfer. We will not be able to accept purchase orders or orders over the phone. All of our payments follow EUR pricing.

Veronym cloud security is based on a self-service system. Master Account is an essential step to start a 14-day free trial period but also to mange your subscription (upgrade/downgrade plans and add-ons), payment details, billing address and subscription cancellation and service users in Veronym customers portal. 

There are two kinds of Veronym accounts. When you start using Veronym, you must first create a master account to administrate billing and to upgrade or downgrade your service. Under your master account you can then create individual user accounts for your employees’ devices. These user accounts are controlled by the master account. Veronym distinguishes these accounts from the client’s main account, which is used for settlement, as well as reporting activities.

Veronym is a user-based service including two devices per one user. You can add unlimited number of users in Veronym customers portal.  You will be charged for each user according to selected price plan.

No. You can assign one price plan for all user under one Master Account. In case you want to upgrade or downgrade Veronym service it will be automatically implemented for all users.

Veronym is a user-based service including two devices per one user. In case you want to extend Veronym service on additional devices you will be charged for new devices according to selected price plan.

 

An increased amount of traffic generated by our customer will result in a capacity increase of Veronym’s service, which is automated, self-learning and auto-scaling, allowing users to have local-like connection around the globe.

No, our clients will not receive any information about it.

Once Veronym’s software is installed on the user’s device it provides a permanent connection to our environment, our secure cloud.

Yes. Installation of our program (from the end user point of view) is not different from the installation of any other applications downloaded by users. Veronym’s software is available for laptops, desktops and smartphones as part of the AppStore or Google Play. The only action required by the user is to enter access data to the application, which they will receive from us individually.

No. Entering username and password is enough to use our application. Installation process is user-friendly for all available platforms. For non-portable devices (or devices other than smartphones and tablets) we will provide our clients with a link to a website from which the application can be download. The installation will prove effortless for all users, even without knowledge about security application configuration or general configuration.

The taskbar shows an icon with the connection status. This connection should be always active. After turning the device on and logging into the desktop in the case of computers, the user will have an automatic connection in the background.

In the event of an unauthorized activity, in particular malicious software, such a harmful application will be blocked and the user will be informed about it via dialog window.

No, because once malware is detected it is placed in quarantine so that it will not appear again. We realize that technical messages might not be fully understandable to all end users. That is why, all information flows to our system in real time, where our operators monitor it at all times and respond accordingly to all incidents.

The traffic generated by devices, from clients’ computers to the Internet, is inspected “on the way” by our systems operating in the cloud. Thanks to this, traffic is thoroughly scanned and the system is flexible, efficient and resistant to failures. Most inspections take place in network and cloud devices, outside of the users’ computers. Software that works directly on the client’s computer additionally inspects traffic, which applies only to the particular part of the user’s activity. Veronym’s software significantly differs from the classic antivirus software, though. Unlike old-generation programs, our software’s impact on the user’s device is minimal. During the causal use of web applications, Veronym service activity is imperceptible. It does not affect the user’s work comfort.

As our solution is automatically scalable, saturation of Veronym performance capabilities is impossible. With the increase of inspected traffic, Veronym adds further resources to the systems in order to achieve its task.

Our service focuses on blocking all malicious activity, all types of threats by default. It might happen that we block an activity which we consider to be malicious although it is not. In such a case, we will be able to fine-tune the appropriate exception to the traffic inspection policy. Veronym’s client company will receive reports on the users’ activity and will be able to access its own employees through our online portal. The portal allows viewing the users’ activity in real time.

Yes. Our clients are able to name an account which we will deactivate on their behalf.

Veronym’s service is designed to block all types of threats. Although various network software is using varied Internet protocols, most of the resources on the Internet are used in web browsers. As they are the users’ main interface, in the case of enountering a threat, an appropriate mechanism will display a notification in a browser window. For instance, detectors may inform the user that he or she is trying to use a high-risk application perceived as a vector through which many threats are transferred. Another scenarios include, among others: attempts to download a virus file, a server trying to launch an application attack on a user’s browser or user trying to download an illegal file. In each case Veronym’s mechanisms inform users why their access has been blocked.

No. An attempt to use a resource carrying a threat will be blocked in real time. For instance, after half an hour has passed, if an application does not present the same risk again as it did before, it will become available again. Our service blocks threats detected only in real time and does not block anything in advance.

Our implementation guides provide all the necessary information about installation process and system requirements for both first-time and advanced users.

No search results.

Licensing

We are always enriching our offer with new products. When new, valuable security systems appear on the market, Veronym adds them to the original security solution. However, the price of our services remains the same. We only inform our clients about further security mechanisms that have been added to Veronym’s service and the benefits arising from them. The software version is updated on the devices, in the background, and does not require any action from the user’s side.

The cost of our services is based on the number of users and devices. We anticipate the possibility that one user might have two devices working at the same time (e.g. laptop and smartphone), so the final price of Veronym’s service depends on the number of users.

No search results.

Data security

We are focused strictly on detecting and blocking threats. Veronym sees everything that happens on a client’s device in terms of recorded incidents related to security breaches. For example, we receive information that we have blocked an email attachment that contained malicious software. Veronym does not have access to the clients’ actual application payload.
Our service provides the possibility to control encrypted traffic. By default, we treat encrypted traffic as potentially malicious and we inspect it to protect customers from possible threats hidden there. Control of encrypted traffic does not mean that Veronym has insight into its application content. In addition, we have the option to define exceptions to the general principles of encrypted traffic in order not to inspect, for example, banking services, health services or other service categories that might contain sensitive user data.

 

The data are not send to us; the client uses the Internet in the same way as before. We inspect activities in the background to detect threats in the traffic. Veronym does not read the content of the data, we neither save it nor process it. The only data at our disposal are security incidents, which generate logs. These traffic logs provide full insight for reports and visibility. However, the data are completely anonymous for us. We call it “metadata”. Veronym sees the IP addresses, data used by clients and threats that were moved by traffic, but does not see the application content and identities of the users behind these connections.

No search results.

Let us handle your IT security

Veronym delivers essential cyber security solutions.
Complex protection does not have to be complicated.
Try it with us!