IT For CEOs & CFOs
News & Views
IT
ATO protection from Flashpoint
Global leader in business risk intelligence, Flashpoint (www.flashpoint-intel.com) has launched its Compromised Credentials Monitoring solution that allows users to monitor exposure of compromised credentials for their enterprise domains and customer email addresses, to ultimately take action after breaches and mitigate the risk of account takeover (ATO).
Using Flashpoint’s advanced technology, the solution quickly collects and processes data and credentials, allowing for organizations to access the most up-to-date breach information and receive notification as soon as credentials have been identified. Flashpoint Compromised Credentials Monitoring comes in two distinct offerings to protect an organization’s employees and customers:
Compromised Credentials Monitoring – Enterprise enables organizations to search and monitor Flashpoint’s unique collections for compromised enterprise accounts and passwords in order to flag accounts, reset employee passwords, and restrict permissions to prevent actors from accessing confidential or personally identifiable information (PII). Flashpoint’s ability to filter out compromised email addresses that do not meet an organization’s password requirements, or identify only data from recent and relevant breaches, allows users to receive alerts on actionable data, saving time and resources.
While, Compromise Credentials Monitoring – Customer allows organizations to monitor for compromised customer credentials, while enabling enterprises to prevent fraudulent activity and protect their client base.
Commenting on the launch, Josh Lefkowitz, CEO and Co-Founder of Flashpoint says, “As the technology, methods, and tools to leverage stolen credentials advance, organisations must have awareness of their exposure to credential breaches, as well as exposed domains and passwords, to ensure their employees or customers are not at risk of having their accounts taken over.
“Flashpoint’s unique and early access to compromised data – whether from closed forums, chat services platforms, publicly released data leaks, or via private threat actor groups – equips organisations with the data needed to mitigate risk to their business and customers.”