lady with computer

Our solution in a nutshell

Find out what's inside our services - learn more about the technologies and processes behind it.

blue wave

We use AWS data center

  • We operate our service in Amazon Web Services' (AWS) Frankfurt data center and use services only with C5 (Cloud Computing Compliance Controls Catalogue) certificate.

  • We have implemented the highest security standards to protect our platform and service.

  • By using AWS we ensure flexibility and scalability of our service.

  • Our service is available worldwide.

System requirements

To use Veronym, you need to install our agent on your device. After the installation, we take care of the rest.

  • We support many devices, including PCs, laptops, servers, tablets and smartphones as well as popular operating systems, such as Windows, macOS, iOS and Android.

  • The agent requires only minimal system resources, so it doesn't hinder working on the protected device.

  • We always keep our agent up-to-date.

Technology

We have based our service on proven solutions and technologies. We always look for providers, who are leaders in their field and their solutions are effectively used in large companies. We integrate these technologies in our platform and offer our clients in a monthly subscription.

  • For device protection we chose technology from Crowdstrike. Using modules from the slim single-agent architecture of the Falcon Platform, we block attacks and eliminate threats.

  • Using NGFW (Next Generation Firewall) together with Prisma Access from Palo Alto Networks we protect the Internet access of our clients worldwide - in the office, at home and on the road.

  • Using Demisto, the SOAR (Security Operations and Automation) technology from Palo Alto Networks, we have automated our Cyber Defense Center and offer our clients 24/7 monitoring of their devices.

Market-leading cyber protection

Veronym Device

  • Our service uses Crowdstrike Falcon Prevent

  • Blocks malware and ransomware infections

  • Blocks fileless and in-memory attacks

  • Protects against attacks, which don’t use malware

  • Has little impact on the device (low use of resources)
    More information

Veronym Device Pro

  • The service uses Crowdstrike Falcon Insight (EDR) and Falcon Device Control

  • Automated detection of advanced attacks

  • Fast investigations with sophisticated forensics in real-time

  • Management and protection of USB devices
    More information

Veronym Internet

  • The service uses Next-Generation Firewall Technology from Palo Alto Networks

  • Classification of all applications

  • Implementation of security policies for all users regardless of their location

  • Defence against known and unknown threats
    More information

Veronym Email

  • The service is based on Proofpoint Essentials solution

  • Advanced protection against malicious URLs and attachments

  • Multilayered antivirus and anti-spam protection

  • Emergency Inbox for 24/7 email continuity

Firewall Connect Service

  • An element of Veronym Ultimate Package

  • VPN connection between the client’s Internet Gateway and Veronym Internet

  • Custom solution, customer-specific configuration necessary

  • Veronym provides configuration parameters for VPN (IPSec) setup

Cyber Defense Center

  • 24/7 service protection

  • Analysis of suspicious events

  • Immediate notification in the case of critical findings

  • High level of automation and use of machine learning

Customer Portal

  • The portal allows you to manage the implementation, keep track of your users and manage their passwords.

  • The Customer Portal offers subscription management - placing orders, checking order history.

  • You can also find your reports there - the state of your security, applications and users in your company. They are detailed and easy to navigate thanks to their drilldown functionality.

Customer support

  • Available during office hours

  • Support during trial period

  • Support during implementation