Make sure user credentials stay in the right hands
Reduce the risk of data breaches by screening compromised passwords and notifying your users when their credentials have been leaked by a third-party data breach.
Hack of streaming service Twitch reveals payment info of top users.
CBC
GoDaddy says data breach exposed over a million user accounts.
TechCrunch
Criminals acquired the personal data of almost 50 million T-Mobile consumers.
Consumer Reports
Third-party breaches affect everybody
Sensitive data breaches are an everyday reality.
Yet traditional methods of recovery only work when the breach is made public. This can take months, leaving you and your users at risk. Auth0 helps you avoid that risk and get ahead of breaches.
RELATED CASE STUDY
How Finder Protects 300,000 Users’ Financial Data With Auth0 ↗How it works
Auth0 helps eliminate the costs associated with account takeovers and protect your users with peace of mind.
Protect
We alert you and your users when their login credentials are detected in any known third-party breaches.
Prevent
Block breached accounts until users change their passwords and add MFA, improving overall security.
Personalize
You can customize the style and content of any breach warning email that gets sent to your users.
ENTERPRISE ADD-ON
Take protection even further with Credential Guard
Augment automated detection methods, using the world's largest database of breach assets, for enterprise scale account takeover prevention.
More coverage worldwide
Improve account protection in 200 countries and territories by alerting users and blocking access attempts using compromised credentials.
Real time detection & monitoring
Secure application login by detecting ATO risks as soon as breaches happen and resetting stolen passwords immediately.
Dedicated teams
Our dedicated security experts uncover stolen data not accessible to scanners/scrapers, saving you months — even years — of delay.
Breached Password DetectionKeep users safe from account hackers using stolen passwords from published security breaches. | Credential GuardProtect high value accounts from takeover attempts by detecting and resetting stolen passwords as soon as possible based on data received from the dark web. | |||
1 Plans included | B2B / B2C Professional and Enterprise | Part of Attack Protection add-on in Enterprise plan | ||
2 Data collection method | Web scanners and scrapers search for user credentials in published security breaches | Dedicated security team to infiltrate criminal communities and gain access to breach data that isn’t available otherwise | ||
3 Typical detection time | Up to 7 - 13 months | 12 - 36 hours | ||
4 Recommended use | Self-service accounts, testing scenarios | Enterprise, production environments, high value accounts | ||
5 Coverage | English only | 200+ countries and territories |
Breached Password Detection
Credential Guard
Keep users safe from account hackers using stolen passwords from published security breaches.
Plans included
B2B / B2C Professional and Enterprise
Data collection method
Web scanners and scrapers search for user credentials in published security breaches
Typical detection time
Up to 7 - 13 months
Recommended use
Self-service accounts, testing scenarios
Coverage
English only
Protect your users and your business from third-party breach risks with Breached Password Detection and Credential Guard.