SureCircle™ Identity Assurance

Verify the person.
Stop the fraud.

Real-time cryptographic identity verification for your highest-risk people. One click. 20 seconds. Unforgeable proof.

Trusted by United Nations Joint Staff Pension Fund Built by Haber & Stornetta
How It Works

Issue. Challenge. Sign. Verify.

Four steps. Twenty seconds. Cryptographic certainty that the person on the other end is who they say they are.

01 — ISSUE

Deploy Credentials

Your CISO issues cryptographic credentials to the people who'd cause the most damage if impersonated.

02 — CHALLENGE

Send the Challenge

Before any high-stakes action, your team sends an Identity Challenge — a single nonce the requester must sign.

03 — SIGN

One-Click Signature

The credential holder signs the challenge with their unique digital signature. Under 20 seconds, end to end.

04 — VERIFY

Cryptographic Certainty

Your team receives signed proof. Cryptographic, non-repudiable, audit-ready. The deepfake never gets the wire.

Four Attacks · One Defense

The attacks your team will see.
All stopped the same way.

Deepfakes, vishing, and BEC exploit one shared weakness: humans can't verify identity in real time. SureCircle™ Identity Assurance closes that gap across every channel attackers use.

01Whaling

Executive Impersonation

Cloned voices and live deepfake video calls authorize urgent wires under the cover of authority and confidentiality. Arup · $25.6M · 15 wires

SureCircle™ Identity Assurance stops it → One Identity Challenge. 20 seconds. The synthetic voice can't sign. The wire never moves.
02Vishing

IT & Helpdesk Impersonation

A "patch" or "active breach" pretext gets a helpdesk to reset MFA or hand over credentials in minutes. MGM Resorts · 10-min call · hundreds of millions in impact

SureCircle™ Identity Assurance stops it → Helpdesk staff verify the requester with one tap before any access changes. No challenge, no reset.
03Pretexting

Bank & Finance Impersonation

"Your bank's fraud department" calls to "reverse" a suspicious charge — harvesting authorization codes under manufactured time pressure. Typical SMB loss · $50K–$500K

SureCircle™ Identity Assurance stops it → Cryptographic caller verification turns "trust me" into "prove it." Unverified callers never get the codes.
04BEC 2.0

Vendor & Supplier Fraud

A "trusted vendor" emails new wire instructions and confirms by phone — citing an audit, acquisition, or routing change. FBI IC3 · top loss category · billions/year

SureCircle™ Identity Assurance stops it → Payment changes verified through pre-registered SureCircle™ Identity Assurance credentials — never through contact info in the request itself.
Why Provenance Wins

Detection has already lost.
Provenance is the answer.

Detection tools analyze content after it exists and guess whether it's synthetic. Generative AI advances faster than detection models can catch up. SureCircle™ Identity Assurance takes the opposite approach: cryptographic credentials exist before any impersonation attempt — attackers can't fake what they don't have.

The SureMark Position

Think of it as a VPN, but for identity.

A Virtual Private Identity Network. Built by Stuart Haber and Scott Stornetta — the co-creators of blockchain, whose foundational invention secures trillions of dollars in digital assets. This isn't using AI to fight AI deepfakes. It's making deepfakes irrelevant.

"Detection asks 'is this fake?' Provenance asks 'is this from who it claims?' We solved the second question in 1991."
Stuart Haber & Scott Stornetta Co-creators of blockchain
Co-founders, SureMark Digital

Protect your highest-risk 25.

Schedule a 30-minute live demo. We'll show you SureCircle™ Identity Assurance in action against your specific threat profile.

Schedule a Demo →
30-min live demo See it work in real time Custom threat assessment