PerimeterX Credential Intelligence

Stop real-world credential stuffing attacks

PerimeterX Credential Intelligence is a cloud-native web app security solution that stops the use of compromised credentials in real time. It provides an early warning system that automatically prevents an attacker from logging in, before fraud is committed.

Read BlogRequest Early Access
PerimeterX Credential Intelligence

Protect Your Customers’ Most Valuable Assets

  • Detect
  • Mitigate
  • Report

Building on the bot detection and mitigation capabilities in PerimeterX Bot Defender, Credential Intelligence offers an additional layer of defense to stop the use of stolen usernames and passwords in real-time. The product leverages an expansive, dynamic and up-to-date database of compromised credentials actively being used in real-world attacks against some of the most popular and highly-trafficked sites on the web. Monitoring dark web sources and attacks happening in the wild, Credential Intelligence provides an early warning system that stops fraud before it happens.

Read Product Brief
Detect

Protect Your Website

Case Study

We’ve seen a significant improvement in our ability to proactively prevent attacks which really takes the pressure off our team. Customer complaints have also decreased now that accounts are secure and we no longer have outages due to spikes in credential stuffing attempts.

Principal Product Security EngineerGlobal E-commerce Retailer
Read Case Study

Why PerimeterX

Flags and Stops Transactions in Real-Time

Flags and Stops the use of Compromised Credentials in Real-time

Provides a new level of intelligence that enables organizations to get early signals that cybercriminals are attempting to use stolen usernames and passwords on their site, and to take mitigating action before any damage is done.

Read Product Brief
Improve Customer Experience and Loyalty

Improve Customer Experience and Loyalty

Provide additional value to your customers and account holders by making sure their accounts cannot be taken over by a bot or cybercriminal, improving customer satisfaction and protecting brand reputation.

PerimeterX Integrations
Stop Real-world Attacks

Stop Real-world Attacks

The PerimeterX database is built from active credential stuffing attacks in the wild, not static lists of credentials that are theoretically compromised and traded on the dark web. This means any database match represents a clear and present danger and an immediate threat, eliminating unnecessary friction when an erroneous intervention is presented to a user.

Read Blog Post
Our Network Effect

Our Network Effect

The solution leverages an expansive, dynamic and up-to-date database of information that PerimeterX gathers from its position protecting some of the most popular and highly-trafficked sites on the web. The PerimeterX database is built from active credential stuffing attacks in the wild, not static lists of theoretically compromised credentials traded on the dark web

Read Case Study
Deter Future Attacks

Deter Future Attacks

Credential Intelligence flips the script on the basic economic viability of credential stuffing attacks by making the lists of compromised credentials irrelevant and useless in the future for any sites it protects, providing a strong disincentive for future bot attacks.

Read Case Study
Enterprise-level Support

Enterprise-level Support

Our 24/7/365 Security Operations Center and customer service team are always available via multiple channels to help you investigate security incidents, provide actionable insights and function as an extension of your team.

Contact Us

Powered by PerimeterX Platform

PerimeterX Credential Intelligence leverages the power of PerimeterX Bot Defender and the PerimeterX Platform. The cloud-native Platform seamlessly integrates into an enterprise’s existing infrastructure and automatically scales to meet demand—no changes or migration required.

Powered by the PerimeterX Platform

How Credential Intelligence Works

How Credential Intelligence Works
  • Collect

    Real-time database consists of credentials that are actively being used in real-world attacks.

  • Detect

    Processes the hashed login attempt at the PerimeterX Enforcer using an asynchronous call to the PerimeterX Detector to determine if the login attempt is a human or a bot.

  • Mitigate

    Blocks unwanted credential stuffing and ATO attempts in real-time. Mitigation is done by the authenticating web app or CIAM solution.

  • Report

    Continuously validates and updates stolen credentials in the database. Network effect constantly improves fraud detection.

© PerimeterX, Inc. All rights reserved.