PerimeterX Credential Intelligence
Stop real-world credential stuffing attacks
PerimeterX Credential Intelligence is a cloud-native web app security solution that stops the use of compromised credentials in real time. It provides an early warning system that automatically prevents an attacker from logging in, before fraud is committed.
Building on the bot detection and mitigation capabilities in PerimeterX Bot Defender, Credential Intelligence offers an additional layer of defense to stop the use of stolen usernames and passwords in real-time. The product leverages an expansive, dynamic and up-to-date database of compromised credentials actively being used in real-world attacks against some of the most popular and highly-trafficked sites on the web. Monitoring dark web sources and attacks happening in the wild, Credential Intelligence provides an early warning system that stops fraud before it happens.
Read Case Study
We’ve seen a significant improvement in our ability to proactively prevent attacks which really takes the pressure off our team. Customer complaints have also decreased now that accounts are secure and we no longer have outages due to spikes in credential stuffing attempts.
Provides a new level of intelligence that enables organizations to get early signals that cybercriminals are attempting to use stolen usernames and passwords on their site, and to take mitigating action before any damage is done.
Provide additional value to your customers and account holders by making sure their accounts cannot be taken over by a bot or cybercriminal, improving customer satisfaction and protecting brand reputation.
The PerimeterX database is built from active credential stuffing attacks in the wild, not static lists of credentials that are theoretically compromised and traded on the dark web. This means any database match represents a clear and present danger and an immediate threat, eliminating unnecessary friction when an erroneous intervention is presented to a user.
The solution leverages an expansive, dynamic and up-to-date database of information that PerimeterX gathers from its position protecting some of the most popular and highly-trafficked sites on the web. The PerimeterX database is built from active credential stuffing attacks in the wild, not static lists of theoretically compromised credentials traded on the dark web
Credential Intelligence flips the script on the basic economic viability of credential stuffing attacks by making the lists of compromised credentials irrelevant and useless in the future for any sites it protects, providing a strong disincentive for future bot attacks.
Our 24/7/365 Security Operations Center and customer service team are always available via multiple channels to help you investigate security incidents, provide actionable insights and function as an extension of your team.
The PerimeterX Platform is a set of cloud-native infrastructure and services that powers an award-winning suite of application protection solutions. These solutions prevent the criminal theft, validation and fraudulent use of consumers’ identity and account information on the websites and mobile apps that leverage a PerimeterX solution.
Real-time database consists of credentials that are actively being used in real-world attacks.
Processes the hashed login attempt at the PerimeterX Enforcer using an asynchronous call to the PerimeterX Detector to determine if the login attempt is a human or a bot.
Blocks unwanted credential stuffing and ATO attempts in real-time. Mitigation is done by the authenticating web app or CIAM solution.
Continuously validates and updates stolen credentials in the database. Network effect constantly improves fraud detection.