Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Guardz Reviews & Ratings
    109 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    101 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website
  • Iris Identity Protection Reviews & Ratings
    3 Ratings
    Company Website
  • A10 Defend Threat Control Reviews & Ratings
    41 Ratings
    Company Website
  • cside Reviews & Ratings
    25 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    502 Ratings
    Company Website
  • Proton Drive Reviews & Ratings
    3,602 Ratings
    Company Website
  • Graylog Reviews & Ratings
    405 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    18 Ratings
    Company Website

What is Have I Been Pwned?

Have I Been Pwned serves two essential purposes. It provides an important service to users by highlighting the widespread nature of data breaches, a concept that many individuals might not fully grasp regarding its regularity and consequences. By aggregating this data, it helps victims identify if their accounts have been affected, while also underlining the serious risks associated with online vulnerabilities in today's digital world. This resource not only informs users but also encourages them to adopt preventive strategies to safeguard their digital identities. As a result, individuals are better equipped to navigate the complexities of online security.

What is DynaRisk Breach Defence?

Asset Monitor tracks all of your publicly accessible assets and services to ensure their security. As your technology landscape evolves, both our protective measures and your risk profile will adapt accordingly. To enhance your workforce's awareness of cyber threats, our specialized training materials and simulated phishing attacks educate employees on essential cyber security practices, preventing them from becoming victims of attacks that could jeopardize your organization. Additionally, Dark Web Monitor provides timely alerts regarding potential data breaches involving sensitive information such as credit card details and personal credentials. We vigilantly observe over 350 cybercriminal organizations to detect any data leaks. Our user-friendly dashboard facilitates monitoring of cyber security concerns effectively. Moreover, the Hack Monitor diligently scans the web for indications that your organization might be under threat from cyber criminals or that you may have already been compromised without your knowledge. The Vulnerability Monitor further inspects your systems for weaknesses that could be exploited by malicious actors. By employing these comprehensive monitoring tools, you can bolster your organization's defenses against the ever-evolving landscape of cyber threats.

Media

Media

Integrations Supported

Axonius

Integrations Supported

Axonius

API Availability

Has API

API Availability

Has API

Pricing Information

Free
Free Trial Offered?
Free Version

Pricing Information

$99
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Have I Been Pwned

Date Founded

2013

Company Location

Australia

Company Website

haveibeenpwned.com

Company Facts

Organization Name

DynaRisk

Date Founded

2015

Company Location

United Kingdom

Company Website

www.dynarisk.com/business/breachdefence

Categories and Features

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Infrastructure Monitoring

Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Popular Alternatives

DataBreach.com Reviews & Ratings

DataBreach.com

Atlas Privacy

Popular Alternatives

Lunar Reviews & Ratings

Lunar

Webz.io
ACID Cyber Intelligence Reviews & Ratings

ACID Cyber Intelligence

ACID Technologies