Identeco
Credential Check

We continuously search for stolen credentials on the internet, analyze them and store the findings in our leak database. If required, you request individual records from our database for verification on your systems - your users remain anonymous.

Planning

Together we plan the deployment for your company. Fully integrated into your existing processes, check the existence of the user’s email address and password in our database of leaked records during logins, new registrations or password changes.

Effective Protection

Define and configure processes to automatically address findings and immediately take action to remediate possible exposure. Restrict affected accounts or require further proof of authentication (e.g., a second factor) before critical transactions are executed.

Installation

A basic implementation will be provided to be integrated by you. Additionally, we can implement a fully customized solution to integrate into you existing landscape and available software stack. Processing of all user data remains in your infrastructure, there is no transmission of identifiable user data required. Results will only be available at your local instance of our Credential Check application. You retain full control over the runtime and operating environment at all times.

Asynchronous and Precise Fit

IT-Security experts ensure most recent collection of available leak data. All queries are executed against our most current dataset. The queries can also be executed asynchronously to your application and the result evaluated at a later point in time, exactly when you need it.