Identity Guard – Leak Monitoring

Leak Monitoring

With no technical barrier of integration, you receive an accurate risk report on the current threat situation. This allows you to directly identify threatened employee accounts and take action.

To do this, we continuously search for stolen credentials on the entire internet, analyze them and store the findings in our leak database. Our risk report allow you to directly identify email addresses of your own IT systems that are vulnerable.

Planning

The provided Leak Monitoring report is adapted to your needs. Notification of affected employees can be carried out by yourself or you can rely on our systems. Our tracking enables you to supports affected employees easily.

Selection

The provided Leak Monitoring report can be either for your company’s domains and all associated e-mail addresses, or for a list of e-mail addresses chosen individually by you. Just as you need it for the effective protection of your company.

Configuration

In our Customer Control Panel, you can configure the intervals and times for generating the Leak Monitoring report. Thereby, you are provided with the most recent report to present in board meetings or internal discussions. Additionally, you can use our bulk mail functionality to inform all affected employees on their risk status by just one click. To ensure higher awareness and trust in these warnings, you can send the Leak Monitoring report in your corporate design directly to all affected employees from a corporate email address of your choice.

Data Privacy

You provide only domain names or hashed email addresses when you order our Leak Monitoring. A pseudonymised list of affected e-mail addresses can be accessed via our costumer control portal. We do not gain any knowledge about affected employees ans operate that way in an absolutely GDPR-compliant way.

Book a meeting

In order to receive a free selection of critical identities and to be able to inform the affected users, please make an appointment with us.