Software Alternatives, Accelerators & Startups

Top 9 Data Breach Products in Identity And Access Management

The best Data Breach Products within the Identity And Access Management category - based on our collection of reviews & verified products.

have i been pwned? Spybot Identity Monitor KeePass KeePassXC OTP Auth Google Security Key Enforcement Authentic8 Silo

Summary

The top products on this list are have i been pwned?, Spybot Identity Monitor, and KeePass. All products here are categorized as: Tools for identifying, managing, and mitigating data breaches and security incidents. Systems for managing user identities and controlling access to resources. One of the criteria for ordering this list is the number of mentions that products have on reliable external sources. You can suggest additional sources through the form here.
  1. Check if your account has been compromised in a data breach

    #Security #Monitoring Tools #Cyber Security 3694 social mentions

  2. Get an overview where your account was leaked.

    #Monitoring Tools #Search Engine #Security & Privacy

  3. KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
    Pricing:
    • Open Source

    #Password Management #Password Managers #Security 208 social mentions

  4. KeePass Cross-Platform Community Edition - A community maintained fork of the popular KeePassX...
    Pricing:
    • Open Source

    #Password Management #Password Managers #Security 238 social mentions

  5. The app for calculating one-time-passwords on iPhone and iPad.
    Pricing:
    • Open Source

    #Password Management #Two Factor Authentication #Identity And Access Management 11 social mentions

  6. More data, more leads, more everything.

    #Productivity #AI #Identity And Access Management

  7. NOTE: OnlyKey has been discontinued.
    OnlyKey is an open source alternative to YubiKey

    #Two Factor Authentication #Identity And Access Management #Authentication 16 social mentions

  8. Enforce the use of security keys to help prevent account takeovers.

    #Password Management #Two Factor Authentication #Identity And Access Management 17 social mentions

  9. Authentic8 puts you in control of the cloud by delivering the browser as a service.

    #Identity And Access Management #Cyber Security #Web Security

Related categories

Recently added products

If you want to make changes on any of the products, you can go to its page and click on the "Suggest Changes" link. Alternatively, if you are working on one of these products, it's best to verify it and make the changes directly through the management page. Thanks!