Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
ACID's Cyber Intelligence solution utilizes a unique system of specialized robots that conduct extensive, efficient, and continuous monitoring of a diverse array of targeted online sources, which encompass:
• Social media platforms
• Criminal forums
• IRC discussions
• Deep Web content
• Dark Net environments
and additional resources...
These investigations are executed using an almost limitless array of client-specified keywords that are seamlessly translated into various languages. The searches target numerous identifiers that could potentially jeopardize the organization, including:
• Compromised usernames and passwords
• Email addresses
• Domain identities
• Credit card information
• Cyber activities
• Intellectual assets
• Key personnel details
and beyond...
Real-time alerts are presented on the intuitive and smart ACID dashboard, ensuring clients receive immediate notifications via email without any delays. Moreover, any new information is promptly shared as it becomes accessible, keeping clients fully informed at all times. This proactive approach enhances the organization's ability to swiftly respond to potential threats.
Description
Protect yourself from online identity theft with continuous data breach monitoring and a secure password vault that simplifies and secures your login process. Utilizing both human insights and dark web surveillance, we promptly notify you if your personal data has been compromised. In the event of a data breach, we provide tailored expert guidance for the specific type of information affected. Weak passwords often serve as the gateway for identity theft and account takeovers, so it's crucial to create robust passwords, safeguard them, and access them from anywhere. By employing a user-friendly password manager alongside vigilant data breach monitoring, you can effectively avert the risk of identity theft stemming from data breaches. Our email address monitoring service alerts you immediately if any of your personal details, like your name, address, or passwords linked to the monitored email, have been leaked in breaches. This proactive approach not only enhances your security but also gives you peace of mind in today’s digital landscape.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
€3.99 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ACID Technologies
Founded
2014
Country
Israel
Website
www.acid-tech.co
Vendor Details
Company Name
F-Secure
Country
Finland
Website
www.f-secure.com/en/home/products/id-protection
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Product Features
Password Management
Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management