Loading...
Browse 99 data breach tools
Free dark web scanning service to identify compromised credentials and data
Free dark web scanning service to identify compromised credentials and data
Generates random email addresses to mask real email and protect identity
Generates random email addresses to mask real email and protect identity
Professional IR services for recovery from advanced cyber attacks and breaches
Professional IR services for recovery from advanced cyber attacks and breaches
Monitors employee data in third-party breaches and alerts on exposure
Monitors employee data in third-party breaches and alerts on exposure
Dark web monitoring service that detects leaked credentials and user data
Dark web monitoring service that detects leaked credentials and user data
Consumer-focused cyber risk mgmt platform with monitoring & education features
Consumer-focused cyber risk mgmt platform with monitoring & education features
Automated dark web monitoring for compromised credentials and passwords
Automated dark web monitoring for compromised credentials and passwords
Monitors deep and dark web for compromised credentials and brand threats
Monitors deep and dark web for compromised credentials and brand threats
Password manager for storing passwords, passkeys, credit cards, and credentials
Password manager for storing passwords, passkeys, credit cards, and credentials
Checks domains and email addresses for security breaches and data exposure
Checks domains and email addresses for security breaches and data exposure
Password manager for storing, generating, and autofilling credentials.
Password manager for storing, generating, and autofilling credentials.
Checks if email addresses have been exposed in known data breaches.
Checks if email addresses have been exposed in known data breaches.
Monitors surface, deep & dark web for data leaks, credential breaches & threats
Monitors surface, deep & dark web for data leaks, credential breaches & threats
Dark web monitoring tool that detects exposed credentials and user data
Dark web monitoring tool that detects exposed credentials and user data
Monitors dark web for compromised credentials and alerts users in real-time
Monitors dark web for compromised credentials and alerts users in real-time
Monitors dark web, black markets, and public sources for leaked credentials
Monitors dark web, black markets, and public sources for leaked credentials
Cyber crime investigation service for digital evidence collection & analysis
Cyber crime investigation service for digital evidence collection & analysis
Monitors open, deep, and dark web for brand threats and digital risks
Monitors open, deep, and dark web for brand threats and digital risks
Professional IR services for cyber attack response and recovery
Professional IR services for cyber attack response and recovery
CASB that encrypts data before reaching cloud apps and monitors threats
CASB that encrypts data before reaching cloud apps and monitors threats
AI-powered data breach response platform for identifying PI/PHI and notifications
AI-powered data breach response platform for identifying PI/PHI and notifications
24/7 incident response service for data breaches and ransomware attacks
24/7 incident response service for data breaches and ransomware attacks
Monitors dark web for compromised credentials and sensitive data exposure.
Monitors dark web for compromised credentials and sensitive data exposure.
Custom cybersecurity policy and procedure development service
Custom cybersecurity policy and procedure development service
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance