You are currently viewing as {{ organizationName }} (return to view as {{partnerContext.description || partnerContext.slug}} )

Notifications

No new notifications

Toggle sidebar

{{ service.description }} {{ serviceStateLabel[0] }} Learn more

Status

Recommendations

For any password found, immediately change ALL passwords associated with the matched email address.

Key insights

  • {{ s.description }} - {{ s.content }}

Results

Table Settings

{{ service.reports?.description || 'Results' }}

{{ service?.exports?.description || 'Data export' }}

{{ note.content }}

Select a timeline

Recent Exports last 7 days

Data exports are available for 7 days before expiring.

  1. Requested at {{ formatISO(e.created) }} for {{ displayExportRange(e) }} by {{ e.creator_first ? `${e.creator_first} ` : '' }}{{ e.creator_last ?? 'Defendify' }}

    Download data Processing New Expiring soon
Compromised Password Scanning #icon-compromised-password-scanning-44 linearGradient stop { stop-color: var(--icon-color-secondary, #82b3e4); } .stopped { stop-opacity: 0; } .password-box { fill: var(--icon-color-primary, #0352a0); } .password-bag { fill:var(--icon-color-primary, #0352a0); } .bag-handle-44 { fill: url(#bag-handle-gradient-44); } .bag-body-44 { fill: url(#bag-body-gradient-44); }

Activate your Compromised Password Scanning

The next step in activating Compromised Password Scanner is to enroll people with email addresses to scan.
Once that’s done, scanning and regular reporting will commence.
And that’s it, you’ll be off and running!

Compromised Password Scanning #icon-compromised-password-scanning-45 linearGradient stop { stop-color: var(--icon-color-secondary, #82b3e4); } .stopped { stop-opacity: 0; } .password-box { fill: var(--icon-color-primary, #0352a0); } .password-bag { fill:var(--icon-color-primary, #0352a0); } .bag-handle-45 { fill: url(#bag-handle-gradient-45); } .bag-body-45 { fill: url(#bag-body-gradient-45); }

What can {{ service.description }} do for you?

The Dark Web is an online underground, most often accessed by special browsers, where stolen data is sold and traded by cybercriminals. If a person’s credentials have been compromised in a breach or other cyber-incident, and are available to be sold, traded, or downloaded, it could pose a serious threat to an organization’s security. Defendify’s Compromised Password Scanning probes the depths of the Dark Web, identifies accounts and credentials that have been compromised, and reports the results back.

Defendify continuously searches the Dark Web for an organization’s email addresses and generates a monthly summary report of findings and recommendations.