WHAT IS AUTOMATED COMPROMISED ACCOUNT MONITORING?
Evolve sets the new global standard in Automated Compromised Account Monitoring.
Unparalleled by any other service, Evolve monitors over 700 Billion compromised accounts from thousands of security breaches from over the past decade. This is 100 times the size as the most commonly known service on the internet.
Stolen usernames and passwords leaked on the internet are the leading way companies are hacked. Attackers no longer need elite hacking skills as they can now simply search for usernames and passwords and login to your corporate systems – without you knowing.
It doesn’t matter if you are an individual consumer, or a business of any size, the Evolve “Automated Compromised Account Monitoring” service provides a cost-effective solution to monitor email addresses and corporate domains every day to give you a heads up on the latest security breaches that affect you.
If a security breach is detected, you will be emailed so you can change passwords immediately. Evolve helps your organization stay on top of the latest threats and proactively manage critical risks that may lead to a security breach.
Evolve Partners can now use our latest Compromised Account Monitoring service to innovate and launch a new type of Automated Security Consulting Practice offering. The Evolve “Compromised Account Monitoring” service helps to identify high risk customers and clients at unprecedented cost levels and with the minimum staff required. It’s a game changer for security experts.
Automated Compromised Account Monitoring is available in the Evolve Marketplace. Simply import this automation service into your Evolve Account with flexible monthly subscriptions to maximize your security budgets MORE
Consumer Compromised Account Monitoring
Micro Business Compromised Account Monitoring
Small Business Compromised Account Monitoring
Medium Business Compromised Account Monitoring
Enterprise Compromised Account Monitoring
On-Demand Compromised Account Search
Evolve Partner Security Sales Generation
Evolve Partner Resell Capability
Multiple Email Account Monitoring
Multiple Corporate Domain Monitoring
Real-Time Email Notifications
Cost Optimization with Manual Search Settings
Cost Optimization with Notification Limits
Cost Optimization with Update Search Restrictions
Cost Optimization with Status Update Options
Password Masking Configurations
Breach Summary Descriptions
Contextual Breach Timeframes
Password Management Recommendations
Online Security Tips
FLEXIBLE SUBSCRIPTION PRICING
Evolve enables you to maximize your security budget by providing flexible monthly subscriptions with no lock in contracts. Simply import the Automated Compromised Account Monitoring service from the Evolve Marketplace that meets your business needs.
|Service Type||Email Addresses||Corporate Domains||Notification Results||Monthly Subscription|
OPTIMISE YOUR COSTS WITH USAGE-BASED BILLING
CREATE SERVICE INSTANCE USAGE
$0.10 per request
Create a new service instance, registering a new subscription. This action automatically triggers a search across the entire data store for all known compromised accounts.
UPDATE SERVICE INSTANCE USAGE
$0.10 per request
Update an existing service instance to change the email addresses or domains monitored by a subscription. This action automatically triggers a search across the entire data store for any new email addresses or domains.
UPDATE SERVICE INSTANCE STATUS USAGE
$0.01 per request
Enable or disable a service instance causing the subscription to be put on hold. Monitoring is suspended immediately. The current month’s subscription will still be charged.
COMPROMISED EMAIL NOTIFICATION USAGE
$0.01 per request
Send an email notification when a security breach is detected that matches a service instance configuration.
ON-DEMAND SERVICE INSTANCE EXECUTION USAGE
$0.10 per request
Manually trigger a search across the data store for the email addresses and domains configured in an existing service instance subscription.
ON-DEMAND SERVICE EXECUTION USAGE
$1.42 per request
Manually perform a search of arbitrary email addresses or domain names across the entire data store. Results will be returned directly in the API response.
FREQUENTLY ASKED QUESTIONS
WHAT IS AUTOMATED COMPROMISED ACCOUNT MONITORING?
Stolen usernames and passwords that are leaked on the internet are now the number one way that companies get hacked.
The Evolve Automated Compromised Account Monitoring service searches over 700 Billion compromised accounts from thousands of security breaches that have occurred over the past decade. When your accounts are detected in a security breach, you will receive an email notification so that you can proactively change the compromised accounts’ passwords.
Pricing packages have been customised specifically for Consumer, Micro Business, Small Business, Medium Business or Enterprise, as well as Evolve Partners.
HOW DO I GET STARTED?
The first step is to register for an Evolve Account. You will then have access to the Evolve Marketplace where you can subscribe to the corresponding Automated Compromised Account Monitoring solution for Consumers, Micro Business, Small Business, Medium Business or Enterprises. Simply import this automation service into your Evolve Account.
You can follow the Getting Started Guide to then create your first Automated Compromised Account Monitoring service instance. The initial results will automatically be emailed to the corresponding recipient, as well as any new breaches detected for your organization.
DOES EVOLVE REALLY SEARCH THAT MANY COMPROMISED ACCOUNTS?
Evolve Automated Compromised Account Monitoring service sets a new standard in account security breach monitoring.
With over 700 Billion compromised accounts and growing every single week, Evolve spans thousands of security breaches collected over a decade to provide unprecidented protection for your accounts.
As a comparison, the next comparable service has only 365 security breaches and 7.8 Billion compromised accounts, which pales into insignificance.
Due to the nature of security breaches and underground hacker data trading techniques, there is certainly expected to be some level of duplication; however, to provide the highest level of quality, Evolve provides you with all of the information that you need to take immediate action to protect your organization.
GETTING STARTED WITH
AUTOMATED COMPROMISED ACCOUNT SECURITY MONITORING
STEP 1: REGISTER AN EVOLVE ACCOUNT
Congratulations for deciding to mature and streamline your security capabilities and maximize your security budgets. Your first step is to simply Register an Evolve Account using the Register button on the Evolve website.
STEP 2: LOGIN TO YOUR EVOLVE ACCOUNT
Now that you have an Evolve Account, login using the Sign-In button on the Evolve website. This will take you to the Evolve welcome screen.
STEP 3: SETUP YOUR EVOLVE BILLING
Evolve subscriptions and usage-based bills are charged via credit card.
- Setup your payment method via the Billing feature located under your Profile Menu towards the top right-hand corner of your Evolve Account.
- Select the “Add Payment Method” button that will load the Evolve Secure Payment Gateway page where you can add your credit card details.
- As part of our fraud-prevention controls, your credit card will be charged a nominal amount that you need to enter to verify your credit card before it can be used for payments.
Your Evolve Account is now setup and you are ready to mature your security.
STEP 4: SELECT YOUR EVOLVE REGION
Evolve is a specialist security automation cloud, which means that it has globally distributed infrastructure enabling geographic security controls allowing you to keep your data and processing within the geographical regions aligned to your business needs.
- Select your Evolve Region in the top right-hand corner of your Evolve Account.
Any actions you take will occur within your selected Evolve Region.
STEP 5: IMPORT SERVICE FROM THE EVOLVE MARKETPLACE
There are a series of Automated Compromised Account Monitoring services available in the Evolve Marketplace, each specifically designed for Consumers, Micro Business, Small Business, Medium Business or Enterprises. Simply import the service into your Evolve Account that meets your business needs.
- To get to the Evolve Marketplace, navigate to the Marketplace side-menu.
- Whilst in the Evolve Marketplace, locate these services by either selecting the “Penetration Testing” category and browsing through the available workflows and services, or by searching for the keyword “compromised”.
- Click on the corresponding marketplace item to review the overview of the service, service usage and subscription pricing information.
- Click the Import button and step through the import steps
- You will then be redirected to the Imports page.
- You may need to use the Reload button to see your newly imported service.
Once the import status changes from “Pending” to “Available”, which in this case should happen almost immediately, you have successfully imported this security automation service and added this specialist security capability to your business.
STEP 6: LAUNCH A SERVICE INSTANCE
You now need to launch a Service Instance that will be executed every time a new security breach occurs to determine if it affects your organization.
- Select the Services side menu item to list your available services.
- Locate the “Create Instance” button alongside your Automated Compromised Account Monitoring service.
- Set a useful name for your service instance and click the Next button.
This will take you to the Parameters page where you provide your organization’s details.
Depending upon your selected service, you may enter series of email addresses or domains as a comma separated list that will automatically be monitored for account security breaches by Evolve. Domains should not contain “www” at the start. For example, “example.com” not “www.example.com”.
Enter your email addresses or domains. Click the “Save” button for this row.
Enter your email address to receive email alerts in the “Notification ID”. Click the “Save” button for this row.
Enter your first name. Click the “Save” button for this row.
Enter your last name. Click the “Save” button for this row.
- Set the “Notification Type” to be “Email. Click the “Save” button for this row.
Set the “Maximum Manual Executions” to be “30”. Click the “Save” button for this row. This parameter lets you restrict the number of manual searches that can be performed using this service instance per month.
Set the “Maximum Notifications” to be “120”. Click the “Save” button for this row. This parameter lets you restrict the number of notifications that are generated by this service instance per month.
- Set the “Maximum Updates” to be “30”. Click the “Save” button for this row. This parameter lets you restrict the number of times the service instance values and configurations can be updated per month.
- Set the “Maximum Status Updates” to be “30”. Click the “Save” button for this row. This parameter lets you restrict the number of times that the service instance can be enabled and disabled per month
- Set the “Mask” to be “FirstOne-LastOne”. Click the “Save” button for this row. This parameter allows you to mask the passwords that are returned by the service instance, or display them unmasked.
- Click the Next button.
- Review your settings.
- Click the Create button.
This will automatically orchestrate your Automated Compromised Account Monitoring service instance.
STEP 7: REVIEW YOUR NOTIFICATION RESULTS
Upon creation of your Automated Compromised Account Monitoring service instance, Evolve will automatically perform a search and generate an email notification containing any matching breaches for your configured email addresses or domains.
Review the Evolve Compromised Account Notification email for risky employees and email addresses. It is recommended that these users be notified of the potential threat and also have their passwords changed on all relevant systems and applications to proactively protect your systems from suffering a security breach.
If you do not receive an email notification, then you should either:
- Check your Spam folder and whitelist domain “evolve-notifications.com”, or
- Evolve did not currently detect a security breach of your accounts.
Evolve is updated with new security breaches multiple times per week. You will receive an email notification for any new security breaches that match your organization.