AllBusiness.com
    • Starting a Business
    • Career
    • Sales & Marketing
    • AI
    • Finance & Fundraising
    • M & A
    • Tech
    • Business Resources
    • Business Directory
    1. Home»
    2. Technology»
    3. The Cybersecurity Tech Company Defending Enterprises and Governments»
    internet security and data protection concept

    The Cybersecurity Tech Company Defending Enterprises and Governments

    AllBusiness Editors
    Security

    VeriClouds is a Seattle- and Japan-based cybersecurity and data SaaS (software-as-a-service) company. It has built a proprietary platform and software using “dark web” threat intelligence and artificial intelligence to address a huge opportunity in the market for global fraud detection and prevention of cyberattacks.

    We sat down with Stan Bounev, the CEO of VeriClouds, and asked him some key questions about the company and how his cybersecurity company helps detect fraud and protects businesses.

    What is the mission of VeriClouds?

    The company’s mission is to protect major corporations and governmental agencies around the world from identity fraud.

    What is the key problem that VeriClouds is trying to solve?

    Stolen passwords are the major method for account takeover and fraud. In 2020 alone, 6.3 billion passwords were stolen; over 80% of all confirmed data breaches involve weak or stolen credentials. The banking, government, healthcare, and retail sectors are most susceptible to fraud. The average cost of a data breach to a company in the United States is $8.6 million and can be multiple times higher.

    vericlouds logoStolen passwords can lead to “account takeover.” Account takeover is a type of cyberattack in which stolen account credentials, typically consisting of lists of usernames and/or email addresses and the corresponding passwords (often from a data breach), are used to gain unauthorized access to user accounts through large-scale automated login requests.

    There are over 130 million account takeover attempts in online retail stores alone each year, and 70% to 80% of e-commerce site login attempts are account takeover attempts. The identity and account takeover fraud problem is real and pervasive.

    What is the technology solution VeriClouds provides and how does it stand out?

    Solving identity fraud is a complex endeavor. Companies and governments need to stitch multiple solutions to try to solve the problem. The solution needs to be holistic and integrate with the whole IT operation. There are three pillars to the solution of this problem:

    1. All of the organizations’s relevant data (internal and external) must be analyzed. The internal data includes usage of data from network monitoring, logs, and login data. The external data includes data from the dark web and public sources.
    2. Integration with identity systems is important. We see more benefits in integrating with the identity systems using widely adopted standards, not with security tools. Identity systems will allow automation, which can’t be achieved by integrating with threat intelligence, log monitoring, or other security systems.
    3. Automation of detection and remediation is key. This problem can only be solved at scale. Scale can be achieved by applying automation at the identity level as large amounts of data need to be used to assess the intent of each user, single out malicious login requests, and allow legitimate users to log in without hurdles. Reacting to identity fraud without automation becomes a human-intensive exercise for which human capital becomes the limiting factor.

    How big is the company’s market opportunity?

    There are many components of identity and account takeover fraud. Among them are data leaks from data breaches, insider threats, phishing, leaks on the dark web, and poor password security. All of those are used for account takeover to steal intellectual property, gain unauthorized access, or commit payment fraud. Experts estimate that the fraud detection and prevention market will grow to $107 billion within five years.

    Who are the customers of your cybersecurity company?

    As you might imagine, the company must keep its clients confidential pursuant to non-disclosure agreements. But our customers include one of the five largest companies in the world and multiple publicly traded companies in the telecom and tech fields.

    VeriClouds can deploy quickly and demonstrate value immediately. Furthermore, in the retail sector, we can help organizations generate revenue as our service works behind-the-scenes and does not need to put our clients’ customers through extra hoops, which leads to churn and abandoned shopping carts. 

    More articles from AllBusiness.com:

    • Data Privacy and Cybersecurity Issues in Mergers and Acquisitions
    • 24 Key Issues in Starting a Tech Company
    • How to Protect Your Business From COVID-19 Scams

    What are the company’s key technology components?

    VeriClouds is a cloud-first company. The company’s SaaS service is hosted on Amazon’s AWS cloud. It is protected by multiple granted and pending patents.

    Our fraud analysis engine uses artificial intelligence services on AWS and Google Cloud Platform (GCP). The company’s dark web search engine is state of the art, and its database of over 24 billion-plus stolen credentials provides a robust ID platform for the detection of identity fraud.

    The company’s technology works with data centers, clouds, and web apps.

    What is the company’s business model?

    The company has a classic enterprise SaaS model, with an annual or multi-year subscription. Since the data is constantly growing, including stolen credentials that are added almost every day to the database, customers continue to benefit, and so the churn rate is very low.

    Who is the management team of your cybersecurity company?

    The team comes out of Microsoft and Amazon. The team has extensive experience in information technology, cybersecurity, software development, product management, and business development. The team is supplemented by investors, a Board, and advisors who have world-class experience in software, cybersecurity, and identity verification.

    RELATED: How to Protect Your Small Business From Today’s Cybersecurity Threats

    Hot Stories

    Cyber attack ransomware-as-a-service text in foreground screen

    Most Ransomware-as-a-Service Attacks Are Against Small Businesses—Here's How to Stay Safe

    IT team member conducting cyber security testing

    How to Do Cybersecurity Testing—And Why Your Company May Not Be As Safe As You Think

    BizBuySell
    logo
    AllBusiness.com is a premier business website dedicated to providing entrepreneurs, business owners, and business professionals with articles, insights, actionable advice,
    and cutting-edge guides and resources. Covering a wide range of topics, from starting a business, fundraising, sales and marketing, and leadership, to emerging AI
    technologies and industry trends, AllBusiness.com empowers professionals with the knowledge they need to succeed.
    About UsContact UsExpert AuthorsGuest PostEmail NewsletterAdvertiseCookiesIntellectual PropertyTerms of UsePrivacy Policy
    Copyright © AliBusiness.com All Rights Reserved.
    logo
    • Experts
      • Latest Expert Articles
      • Expert Bios
      • Become an Expert
      • Become a Contributor
    • Starting a Business
      • Home-Based Business
      • Online Business
      • Franchising
      • Buying a Business
      • Selling a Business
      • Starting a Business
    • AI
    • Sales & Marketing
      • Advertising, Marketing & PR
      • Customer Service
      • E-Commerce
      • Pricing and Merchandising
      • Sales
      • Content Marketing
      • Search Engine Marketing
      • Search Engine Optimization
      • Social Media
    • Finance & Fundraising
      • Angel and Venture Funding
      • Accounting and Budgeting
      • Business Planning
      • Financing & Credit
      • Insurance & Risk Management
      • Legal
      • Taxes
      • Personal Finance
    • Technology
      • Apps
      • Cloud Computing
      • Hardware
      • Internet
      • Mobile
      • Security
      • Software
      • SOHO & Home Businesses
      • Office Technology
    • Career
      • Company Culture
      • Compensation & Benefits
      • Employee Evaluations
      • Health & Safety
      • Hiring & Firing
      • Women in Business
      • Outsourcing
      • Your Career
      • Operations
      • Mergers and Acquisitions
    • Operations
    • Mergers & Acquisitions
    • Business Resources
      • AI Dictionary
      • Forms and Agreements
      • Guides
      • Company Profiles
        • Business Directory
        • Create a Profile
        • Sample Profile
      • Business Terms Dictionary
      • Personal Finance Dictionary
      • Slideshows
      • Entrepreneur Profiles
      • Product Reviews
      • Video
    • About Us
      • Create Company Profile
      • Advertise
      • Email Newsletter
      • Contact Us
      • About Us
      • Terms of Use
      • Contribute Content
      • Intellectual Property
      • Privacy
      • Cookies