This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
The leaks it notifies me about are generally easy to trace. Although some of these leaks involve reused information that was compromised a long time ago, I still find its performance in this area impressive. Review collected by and hosted on G2.com.
Regarding the CTI, I am not a fan of how information is obscured when it comes to leaks. I wish there were a way for threat intelligence officers who are responsible for responding to these leaks to have an assigned access level that allows them to view the plain text raw data, rather than having it obscured. However, I do understand the need to comply with data handling frameworks. Review collected by and hosted on G2.com.
Thanks for sharing such detailed feedback! Great to hear you find our breach and leak alerts helpful in tracing compromised data. We appreciate your comments regarding access to raw data for CTI teams. We understand the balance between data transparency and compliance with data handling frameworks can be challenging. Your feedback is valuable and will be shared with our product team as they continue to evaluate ways to support different user roles while maintaining security standards.
Please don’t hesitate to reach out if you have any more insights or suggestions — we’re always here to listen and work together to make usecure even better.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
This reviewer was offered a nominal incentive as thanks for completing this review.
Invitation from G2 on behalf of a seller or affiliate. This reviewer was offered a nominal incentive as thanks for completing this review.







