IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Identity Automation launches credential breach monitoring service

New monitoring solution adds to the firm’s flagship RapidIdentity platform

Identity Automation has announced a new compromised credentials monitoring service for K-12 schools and universities.

The service, which adds to Identity Automation's RapidIdentity platform, scans the dark web for hacked usernames and passwords, enabling swift and effective protection against ransomware threats and data breaches, according to the company. 

Powered by SpyCloud, the service also alerts school IT administrators to compromised managed identities, including students, faculty, staff, parents, alumni, and external third parties, via a daily status report.

Users can create custom automated responses via RapidIdentity, enabling actions such as monitoring identity information, ending sessions with compromised credentials, locking accounts, requiring a password reset before restoring users’ privileges, or implementing multi-factor authentication for affected users.

Administrators can automatically assign users to pertinent groups and distribution lists, revoke access based on provisioning policies, and more through dynamic role management.

"Preventing ransomware is possible by negating the top attack vector: credentials that have been exposed in data breaches. This service gives schools early identification of compromised accounts, enabling them to take action quickly and prevent cyber attacks that leverage recently-breached identity data,” explained Cassio Mello, senior vice president of business development at SpyCloud. 

Identity Automation's credentials monitoring service also includes support for secure remote access and virtual private network (VPN) logins. Additionally, RapidIdentity facilitates single sign-on for security assertion markup language (SAML)-compatible mobile applications.

Related Resource

The truth about cyber security training

Stop ticking boxes. Start delivering real change.

Pair of feet in socks with a chair and plant in the backgroundFree download

Institutions can also leverage pre-built connectors for integration with Text/Flat File (csv, xml), web services (SOAP/REST), and command line interface (CLI), among others.

Identity Automation CEO Jim Harold said: "Our compromised credentials monitoring service can help schools avoid the fate of other education organizations that have paid out hundreds of thousands of dollars in ransom or suffered massive data loss from a hacking incident.” 

"And because it's integrated with the RapidIdentity platform, IT administrators can automate responses and focus on singular threat vectors instead of analyzing credential issues. This approach is more secure and more efficient."

Featured Resources

ZTNA vs on-premises VPN

How ZTNA wins the network security game

Free Download

The global use of collaboration solutions in hybrid working environments

How companies manage security risks

Free Download

How to build a cyber-resilient business ready to innovate and thrive

Outperform your peers in your successful business outcomes

Free Download

Accelerating your IT transformation

How Cloudflare is innovating for CIOs to start 2023

Watch now

Recommended

Analysing the economic benefits of Trend Micro Vision One
Whitepaper

Analysing the economic benefits of Trend Micro Vision One

16 Mar 2023
The IT manager's guide to getting home in time for dinner
Whitepaper

The IT manager's guide to getting home in time for dinner

15 Mar 2023
Better APIs for better business
Whitepaper

Better APIs for better business

13 Mar 2023
The global use of collaboration solutions in hybrid working environments
Whitepaper

The global use of collaboration solutions in hybrid working environments

9 Mar 2023

Most Popular

Tech pioneers call for six-month pause of "out-of-control" AI development
artificial intelligence (AI)

Tech pioneers call for six-month pause of "out-of-control" AI development

29 Mar 2023
Getting the best value from your remote support software
Advertisement Feature

Getting the best value from your remote support software

13 Mar 2023
Microsoft Security Copilot could be a seismic success for the tech industry
Security

Microsoft Security Copilot could be a seismic success for the tech industry

29 Mar 2023