You will immediately receive the latest threat data to proactively run a check against your existing customer and employee accounts. In addition, you will continuously receive the complete set of all leak data known to us for the protection of your accounts.
To do this, we continuously search for stolen credentials on the entire internet, analyze them and store the findings in our leak database. New records are sent to you immediately so that you can test them on your own infrastructure against your customer and employee accounts. This ensures the anonymity of your users at any time.
Together, we plan the deployment within your company. In doing so, we take into account the already in place systems you use to authenticate employees and customers. Existing databases and authentication stacks that you have developed yourself can also be easily used by our software.
Our approach enables you to define processes to automatically address accounts at risk. Restrict affected accounts or require further proof of authentication (e.g., a second factor).
With Live Feed, you can comply with basic requirements of the BSI IT-Grundschutz-Kompendium.
Measures SHALL be taken to detect password compromise. – Module ORP.4 Identity and Authorization Management
We provide a prepared applicance to be deployed in your local infrastructure. Initially deployed it registers with Identeco’s systems and automatically receives all data records from us for evaluating risk of compromise for customer and employee accounts. In the process, you retain control over the runtime and operating environment.
If you wish, our container updates itself automatically and thus, it remains a secure endpoint in your IT infrastructure with up-to-date software.
Book a meeting
In order to receive a free selection of critical identities and to be able to inform the affected users, please make an appointment with us.