Top 15 Leakwatch Alternative and Similar Softwares | May 2024

The use of stolen passwords is now the most common vector of cyberattacks. If some of your users credentials have been compromised, you want to know it as soon as possible. Enhance your employees security and build your customer trust by preventing their accounts from beeing hacked. With its security intelligence solution, Leakwatch allows you to protect your company againts those threats.

1. Snusbase.com

Snusbase.com The industry leading database lookup. We pride ourselves in being faster than all of our competitors, wile maintaing a very large selection of private and public databases.......

2. SkidBase

SkidBase Are you looking for a leakedsource alternative? Here is a Lookup tool that includes all the big databases such as myspace, twitter, 000webhost, ashley madison and Linkedin. This will help you protect your instagram, xbox, twitter and other social media accounts from being hacked. Sign up today and see if......

3. LeakBase

LeakBase Check if your account credentials have been leaked.......

4. ReversingLabs TitaniumCloud

ReversingLabs TitaniumCloud The ReversingLabs TitaniumCloud File Reputation service provides the industry’s most comprehensive source for threat intelligence and reputation data on files. It contains up-to-date reputation and internal analysis information on over 2.5 billion goodware and malware files. It identifies files and provides rich information about their internals and contents. Every sample......

5. Barricade

Barricade We thought security products were too complex, difficult to use and inaccessible - so we set out to build the most simple, human and intuitive security product ever made. In other words the kind of security product we want for ourselves. At its core Barricade works like an early warning......

6. LeakedSource

LeakedSource Have you been hacked? Search hundreds of leaked databases like LinkedIn, 000webhost, Neopets and Mate1 by name, email, ip address, and phone number!......

7. Unified VRM by NopSec

Unified VRM by NopSec NopSec Unified VRM® provides up to a 40% time savings for security teams by eliminating the manual tasks involved with vulnerability risk management. Our cloud-base solution helps you identify, prioritize, proactively manage and report on IT vulnerabilities and security breaches from a single platform.Our Differentiators:1. Adaptive Expert Intelligence - Offers......

8. 1E Tachyon

1E Tachyon Tachyon bridges the gap between IT operations, security and compliance teams to fixing urgent issues that impact their business. Business leaders gain confidence that their IT systems are working optimally with real time query and response abilities.......

9. SECDO

SECDO With a combination of automated alert validation, contextual investigation, threat hunting and rapid remediation, SECDO gives security professionals the power to keep the enterprise free from threats. Only SECDO automatically validates every SIEM alert, using detailed endpoint activity history and causality analysis to provide the full context of the alert......

10. HP ArcSight

HP ArcSight A comprehensive Security Information & Event Management (SIEM) solution that enables cost-effective compliance and provides advanced security analytics to identify threats and manage risk, so you can protect your business.How Mature Are Your Security Operations?See how your organization stacks up by taking a 4-minute, free and anonymous IT security assessment.......

11. IBM QRadar

IBM QRadar IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies......

12. WMI Tools

WMI Tools WMI Tools is a free toolkit from AdRem Software designed to access WMI information both locally and remotely.The General Info view presents a general summary of the system. The Processes view shows a list of active processes and their resource utilization. The Services view shows a list of installed services......

13. Tab Data (+Memory usage)

Tab Data (+Memory usage) Provides user with tab related stats/data - FeaturesHow many tabs are currently openHow many tabs have been opened during this Firefox sessionHow many tabs have been opened since addon installedPreference to toggle tab memory usage on/offMemory usage displayed on panel UI (JSON or Plain)Preference to include url on memory usage......

14. HIPAA Institute

HIPAA Institute The HIPAA institute empowers you with its best in class compliance solutions, powerful tools and holistic hipaa security and compliance resources you can trust. Trust HIPAA institute to walk you through creation of compliance policies and procedures, and HIPAA privacy nuances, and provide you with customized comprehensive compliance solutions, be......

15. Spyrix Employee Monitoring

Spyrix Employee Monitoring Spyrix Employee Monitoring – is a modern solution for employees activity monitoring on PC.Spyrix helps business owners to solve several problems:1. Increasing employee productivity by monitoring the use of his time.The application provides detailed log of employee activity that allows monitoring activity not directly related with the employee duties: games,......