Interested in the Veurr5? Be sure to download our latest company brochure.


Authenticate the human, not the credential.

The major shortfall in modern information security solutions is that they are primarily dependent on user profiles for determining privileges, access, and attribution. Security largely ends after the login. Only by continuously verifying the user, can one have accurate visibility across the network.

In old Norse, Veurr stands for “Protector.” As such, within the realm of information security, Veurr, Inc develops disruptive technologies designed to safeguard your personal, sensitive, and critical information.


Interested in getting your “hands on” the Veurr5 keyboard?

The Veurr5 keyboard is currently under development, however you may still participate through one-of-two options:


We are currently in the process of securing a round of investment. If you would like to participate, find out how you can participated, today!


Can’t wait for the Veurr5 to hit the market? Want to capitalize on pre-release discounts? Find out how, today!

Pseudo Security

In the beginning there was only a password. Then, with additional users, came usernames.

Two-Factor Authentication

Pseudo security (first factor) combined with a second authentication system.

Facial and Retinal

Incorporation of facial and retina recognition into one-time authentication.

Continuous Verification

The use of personally identifiable information and transparent verification.

The Veurr5 Difference

The disruptive technology being explored by the engineers at Veurr, Inc challenges the almost every aspect of modern security,
revolutionizing how home users and corporations alike perceive, interact with, and comprehend information security.

All-key Biometrics

Retinal and facial scanners are quite intrusive. Our all-key biometrics affords a passive and transparent form of human user verification.

Continuous Verification

Replace one-time authentication with continuous user verification and rest assured that only authorized users are active on the network.

Biometric Encryption

Ensure that files or an entire drivespace can only be accessed by the content owner by generating encryption keys based on the owners prints.

Mitigate Password Sharing

Remember Edward Snowden? He was able to steal critical information by using a co-workers username and password. Just imagine if the Vuerr5 was in place…

Realtime Awareness

Security and attribution are essential. Know the people, not the profiles, of those active on your network and exactly who is behind the activity.

Eliminate Piggy-backing

No more having to lock your computer before racing to the printer or worrying about someone using your account while collaborating with a colleague.

Attention tech bloggers, want to test out the Veurr5 and see if it stands up against the hype?

But, why continuous fingerprints over other forms?


Here at Veurr, Inc we’ve conducted extensive research into many forms of biometric-based authentication such as retina examination, keystroke analysis, facial recognition and each has their merits. However, in the end, we found that there were three critical elements which only passive fingerprint technology could address.

The advanced biometrics and detection algorithms behind the Veurr5 keyboard are non-intrusive and transparent to the user.

The process begins and ends with each keystroke, preventing piggy-backing and theft or sharing of passwords.

The Veurr5 keyboard offers continuous, real-time human verification, as opposed to modern one-time, credential authentication.

As encryption keys are generated from the users fingerprint signatures, rest assured that only the person, not the password, may access critical information.

Unlike lengthy keystroke recognition, the algorithms behind the Veurr5 keyboard achieves detection in within 3 keystrokes or mouse click.

As a result of real-time human verification, network admins are able to achieve 100% verification of users active on their networks.

With the Veurr5 keyboard, you may continuously verify the user behind the activity.  Don’t let security end at the profile.