Loading...
Attack surface management tools for discovering, monitoring, and reducing external attack vectors to minimize cybersecurity risks. Task: Data Breach
Browse 55 security tools
Check if your email address has been involved in a data breach.
Dark web monitoring tool that detects leaked/stolen credentials.
Deep & dark web intelligence platform for threat monitoring & investigation.
Real-time dark web monitoring for ransomware, data leaks, and govt threats.
Monitors dark web and other sources for leaked credentials and breached data.
Dark web monitoring tool that tracks exposed company data and credentials.
Monitors web & dark web for credential leaks to give orgs early breach warnings.
Dark web monitoring for compromised business credentials & domains.
Enterprise dark web monitoring platform for stolen credential detection.
Dark web monitoring service scanning for stolen credentials and org data.
Managed dark web scanning service to detect exposed credentials.
DRP platform monitoring 2000+ sources for data breaches & dark web threats.
Managed dark web monitoring with human-vetted intelligence and actionable alerts.
Managed OSINT monitoring service covering all web layers for data leak detection.
Deep & dark web search engine for threat monitoring and data leak detection.
Free dark web scanning service to identify compromised credentials and data
Monitors employee data in third-party breaches and alerts on exposure
Dark web monitoring service that detects leaked credentials and user data
Cyber risk management platform for SMEs with breach monitoring and training
External cyber risk assessment tool for businesses and portfolios
Monitors deep and dark web for compromised credentials and brand threats
Checks domains and email addresses for security breaches and data exposure
Monitors dark web for compromised credentials and alerts users in real-time
Get strategic cybersecurity insights in your inbox