HOW IT WORKS
A compromised password is any password that has been found in a data breach or password cracking dictionary used by cybercriminals.
Check whether a password is unsafe.
A compromised credential is an exact username and password combination that has been found in a data breach, data exposure, or combo-list used by cybercriminals.
Determine whether a username/password combination is available to hackers, an obvious security gap.
An exposure is any unintended release of user credentials. This could be due to a data breach at a site, malware that has captured user credentials, a phishing site that has been capturing user credentials, etc.
Look up all the exposures for your users and obtain detailed information about each.
HOW IT CAN HELP ME
Easily integrate our APIs to receive the earliest possible insight into data breaches or PII exposure, allowing you to mitigate damage caused by leaked credentials and remediate when customer or employee data becomes available on the Dark Web.
While any of our APIs are callable directly, by far the easiest way to get started using Enzoic (formerly PasswordPing) is to use one of our rich suite of libraries that you can use within your applications. We offer a series of Quick Start tutorials for each.
Get started with a free API key. With free plans up to 2,000 calls, our pricing is designed to scale with you.
Our APIs give you multiple options for proactively avoiding exposure.
“We’re impressed with Enzoic’s creative approach to catching credential stuffing attacks using their database of compromised credentials as a proactive defensive against ATO. Enzoic does this securely without cracking hashed passwords or being given access to our users’ credentials and doesn’t add unnecessary steps to our customers’ login process.”
Free for up to 2,000 Calls!
First 2,000 Calls: $0 / Call Next 3,000 Calls: $0.040 / Call Next 5,000 Calls: $0.020 / Call Next 40,000 Calls: $0.015 / Call Next 50,000 Calls: $0.010 / Call Next 100,000 Calls: $0.008 / Call Next 800,000 Calls: $0.005 / Call Over 1M Calls: Contact Us
Self-Service / Knowledge Base
24-hour response during business week
4-hour response during business week
Cleartext Credentials API
Effective threat intelligence for compromised credential screening involves discerning reconnaissance and real-time analysis and deployment.
FINRA produced guidance for organizations to tighten their cybersecurity, but no advice was provided regarding the issue of password hygiene.
The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.