SolarWinds Identity Monitor lets you know when your employee’s credentials appear in data breaches. This enables you to take action to protect your organization, preventing bad actors from accessing your systems and data.A team of skilled researchers continuously collects credentials from data leaks from across the dark web, processes the data, and notifies if something associated with your monitored domains appear in a data breach.
- Monitoring employee email addresses for exposure from data breaches
- Past breach history with timeline and details
- Employee private email address monitoring—for high-impact employees or board members
- IP address monitoring (available from certain licensing tiers)
Features:
-
Email Domain Watchlist:
-
Historic Exposure Check:
-
Private Email Address Monitoring:
-
Comprehensive Breach Database:
-
IP Address Monitoring:
In addition to email domains, from certain subscription tiers, you can add an IPv4 Address or IPv4 Network CIDR to your watchlist to be monitored for exposure in botnets and breaches. If an IP address is matched with a botnet, it might indicate an employee has active credential stealing malware on their computer. If a monitored IP address shows up in a breach, it’s typically because the exposed data contains the last logon IP of a user.
-
More than Credentials:
Depending on the data breach, Identity Monitor can display more information. For example, the password encryption type (or lack thereof in case of plain-text leaked passwords), salt, account signup time, and personally identifiable information associated with the data breach.
-
Domain Verification:
Specification:
- Identity monitor is a yearly subscription service.
- The subscription tiers are based on the number of employees in your organization, with higher tiers allowing more domains and IP address monitoring.