Skip to main content

Next Generation Authorization—Okta Fine Grained Authorization is here

Next Generation Authorization—Okta Fine Grained Authorization is here

Register now

Register now

Register now

Free trial
Contact us
Questions? Contact us: 1 (800) 425-1267
A login screen with a pop-up prompting a password update layered on an image of a woman on her smartphone

Third-party breaches affect everybody

Sensitive data breaches are an everyday reality. Yet traditional methods of recovery only work when the breach is made public. This can take months, leaving you and your users at risk. We help you avoid that risk and get ahead of breaches.

Read the case study ↗

How it works

Our platform helps eliminate the costs associated with account takeovers and gives your users peace of mind when interacting with your brand.

A login screen with a pop-up prompting a user to update their password layered on an image of a man working on his laptop

Protect

We alert you and your users when their login credentials are detected in any known third-party breaches.

Prevent

Block breached accounts until users change their passwords and add MFA, improving overall security.

Personalize

You can customize the style and content of any breach warning email that gets sent to your users.

Take protection even further with Credential Guard

Explore enhanced detection methods, using the world’s largest database of breach assets, for enterprise-scale account takeover (ATO) prevention.

A banner showing that breached password detection is monitoring a user’s credentials
Three banners layered on one another showing different kinds of notifications and how you can customize them
Two banners layered on one another showing different ways you can block compromised credentials and user accounts

Breached Password Detection

Keep users safe from account hackers using stolen passwords from published security breaches.

Credential Guard

 

Protect high value accounts from takeover attempts by detecting and resetting stolen passwords as soon as possible based on data received from the dark web.

Plans included

B2B / B2C Professional and Enterprise

Part of Attack Protection add-on in Enterprise plan

Data collection method

Web scanners and scrapers search for user credentials in published security breaches

Dedicated security team to infiltrate criminal communities and gain access to breach data that isn’t available otherwise

Typical detection time

Up to 7 - 13 months

12 - 36 hours

Recommended use

Self-service accounts, testing scenarios

Enterprise, production environments, high-value accounts

Coverage

English only

200+ countries and territories

Keep users safe from account hackers using stolen passwords from published security breaches.

Plans included

B2B / B2C Professional and Enterprise

Data collection method

Web scanners and scrapers search for user credentials in published security breaches

Typical detection time

Up to 7 - 13 months

Recommended use

Self-service accounts, testing scenarios

Coverage

English only

To connect with a product expert today, use our chat box, email us, or call +1-800-425-1267.
Contact Us
Company

Copyright © 2024 Okta. All rights reserved.
  • Privacy Policy
  • Site Terms
  • Security
  • Sitemap
  • Your Privacy Choices