Arc is the new service from Threat Status which enables your customer facing authentication services to query in real time for access attempts using username and password pairs already known to criminals - so you can instantly step in and avoid losses.Try The Interactive Demo
When it comes to building applications intended for external users, high levels of security need to be included, but it can be a delicate balance between implementing robust security controls and damaging the user experience.
Traditional security controls designed for enterprises, like two factor authentication often aren’t a good fit for consumers. Your users want to be able to get access to your services quickly and without fuss, and any friction added to a users journey can risks losing you valuable subscribers or worse – revenue.
The reality is however, that one of the biggest vulnerabilities to consumer applications is the consumer themselves, and specifically their password behaviour.
End users don’t understand the risks associated with weak password choices, or that using the same password across multiple applications introduces a security risk to your online service, but more importantly they don’t really care.
Due to the fact that poor user password hygiene across internet applications remains a top security threat to application owners Threat Status have developed Arc specifically to minimise that threat with zero impact on your users authentication experience.
Download the Datasheet
Instantly check your subscriber logins and signups against billions of already leaked user credentials from 3rd party data breaches.
Improve B2C authentication security and reduce fraud attempts to your public facing applications with zero additional user friction
Supports username and password pair, email and password pair, or just password leak checking.
No requirement for your existing or future subscribers to interact with SMS or 2FA tokens which could result in user drop off or costly deployment
Complete security and privacy of checked user credentials using known and trusted existing cryptographic algorithms.
Sub-second check and respond API’s ensure rapid risk decisions can be made.