Used by everyone from F1 teams to Governments, Trillion hunts for shadow usernames and passwords stolen during 3rd breaches which belong to your organisation.
The reality is, most internet users rely on the same username (usually their email address) and password for access to multiple accounts across the web.
With data leaks now occurring on an almost daily basis, billions and billions of those usernames and password pairs are now in the hands of criminals and hackers and more are leaking every day. We call these reused, leaked usernames and passwords "Shadow Credentials".
The impact of Shadow Credentials being in the wrong hands is that they can potentially provide simple, successful, undetected access to business services and confidential business data and provide a perfect launchpad for invoice fraud and spear phishing. Particularly for organisations who run a lot of their services in the cloud.
Trillion is an enterprise grade Shadow Credential early warning system. Trillion monitors criminal forums and dark markets, observing the billions of traded usernames and passwords, looking for the ones that are associated with your organisation. Trillion provides instant alerting, risk analysis, visualisation, source identification and remediation steps to help you determine rapidly if any of your business users have inadvertently undermined your corporate security measures.
You can sign up your organisation for a free account to start monitoring for your data today.
Trillion currently scores 55/100 in the Cyber & Data Security category. This is based on press buzz (28/100), and other relevant information on Trillion gathered from around the web.
The score for this software has stayed the same over the past month. What is this? |
Any.
Trillion is used by organisations like F1 racing teams, Government organisations and Global Telecoms companies, to prevent usernames and passwords, leaked from 3rd party systems being used by unauthorised individuals or groups to gain access to corporate services.
Business Email Compromise and Email Fraud are now significant risks for businesses and the potential for Shadow Credentials to be used to perpetrate these crimes is on the rise.
Trillion is usually operated by IT or Security teams, with the support of affected end users. Operators (e.g. SOC) have the ability to see the users affected by a data breach while Trillion keeps sensitive information protected. Operators have the ability to "invite" users to directly interact with Trillion to review and feedback to the operators about any sensitive information found and whether it is a threat to the business.
Yes. Trillion can support multi user access and multi domain monitoring.
Trillion is used to support IT and Security teams enforce the integrity of their Identity and Access Management systems.
At this time Trillion does not integrate with any other applications as features like incident management tickets are built directly into the system, but integrations with SIEM and external ticketing systems are scheduled for release shortly.
Yes, within Trillion itself there is direct access to customer support, and when sensitive information (such as located passwords) are delivered to end users they have direct access to a wide range of educational guidance and training on how data is found, best practice for choosing secure passwords, and how poor password use can impact your business.
An API is currently in development.