
Our solution in a nutshell
Find out what's inside our services - learn more about the technologies and processes behind it.

We use AWS data center
We operate our service in Amazon Web Services' (AWS) Frankfurt data center and use services only with C5 (Cloud Computing Compliance Controls Catalogue) certificate.
We have implemented the highest security standards to protect our platform and service.
By using AWS we ensure flexibility and scalability of our service.
Our service is available worldwide.
System requirements
To use Veronym, you need to install our agent on your device. After the installation, we take care of the rest.
We support many devices, including PCs, laptops, servers, tablets and smartphones as well as popular operating systems, such as Windows, macOS, iOS and Android.
The agent requires only minimal system resources, so it doesn't hinder working on the protected device.
We always keep our agent up-to-date.

Technology
We have based our service on proven solutions and technologies. We always look for providers, who are leaders in their field and their solutions are effectively used in large companies. We integrate these technologies in our platform and offer our clients in a monthly subscription.
For device protection we chose technology from Crowdstrike. Using modules from the slim single-agent architecture of the Falcon Platform, we block attacks and eliminate threats.
Using NGFW (Next Generation Firewall) together with Prisma Access from Palo Alto Networks we protect the Internet access of our clients worldwide - in the office, at home and on the road.
Using Demisto, the SOAR (Security Operations and Automation) technology from Palo Alto Networks, we have automated our Cyber Defense Center and offer our clients 24/7 monitoring of their devices.
Market-leading cyber protection

Veronym Device
Our service uses Crowdstrike Falcon Prevent
Blocks malware and ransomware infections
Blocks fileless and in-memory attacks
Protects against attacks, which don’t use malware
Has little impact on the device (low use of resources)
More information

Veronym Device Pro
The service uses Crowdstrike Falcon Insight (EDR) and Falcon Device Control
Automated detection of advanced attacks
Fast investigations with sophisticated forensics in real-time
Management and protection of USB devices
More information

Veronym Internet
The service uses Next-Generation Firewall Technology from Palo Alto Networks
Classification of all applications
Implementation of security policies for all users regardless of their location
Defence against known and unknown threats
More information

Veronym Email
The service is based on Proofpoint Essentials solution
Advanced protection against malicious URLs and attachments
Multilayered antivirus and anti-spam protection
Emergency Inbox for 24/7 email continuity
Firewall Connect Service
An element of Veronym Ultimate Package
VPN connection between the client’s Internet Gateway and Veronym Internet
Custom solution, customer-specific configuration necessary
Veronym provides configuration parameters for VPN (IPSec) setup


Cyber Defense Center
24/7 service protection
Analysis of suspicious events
Immediate notification in the case of critical findings
High level of automation and use of machine learning
Customer Portal
The portal allows you to manage the implementation, keep track of your users and manage their passwords.
The Customer Portal offers subscription management - placing orders, checking order history.
You can also find your reports there - the state of your security, applications and users in your company. They are detailed and easy to navigate thanks to their drilldown functionality.


Customer support
Available during office hours
Support during trial period
Support during implementation