Identify and remove leaked passwords

Stockholm, June 25, 2019 – Specops Software announced today a new release of Specops Password Policy. The solution’s downloadable leaked password list with close to one billion passwords, now supports leaked password scanning. The solution enables you to detect accounts using leaked passwords, and enforce a password change.

Blocking leaked passwords is an important password security practice that is recommended by security experts and industry regulators. With so many leaked passwords available online, the ability to find accounts with vulnerable passwords, and forcing a password change, ensures end-to-end protection against this exploited attack vector.

“Identifying leaked passwords is a key security measure to stop hackers from reusing the billions of leaked passwords currently available online,” said Lori Osterholm, CTO at Specops Software. “Specops Password Policy is the only password filtering software that can identify leaked passwords used in Active Directory.”

Specops Password Policy, offers an advanced set of password security and auditing capabilities, including finding leaked passwords and enforcing passphrases, while banning the use of predictable password patterns. The solution’s extensive password blocking capabilities ensure organizations are protected from leaked passwords continuously.

“With Specops Password Policy, organizations can get a comprehensive view of their current password situation and easily remove password-related vulnerabilities,” said Osterholm.

Specops Password Policy is continuously developed with new functionalities to security concerns. Recent releases include support for length-based password aging, and a downloadable compromised password list containing 1 billion leaked passwords.

Click to learn more about how Specops Password Policy can ensure end-to-end password protection.

About Specops Software 

Specops Software is the leading provider of password management and authentication solutions. Specops protects your business data by blocking weak passwords and securing user authentication. With a complete portfolio of solutions natively integrated with Active Directory, Specops ensures sensitive data is stored on-premises and in your control. Every day thousands of organizations use Specops Software to protect business data.

Media Contact
outpost24@eskenzipr.com

(Last updated on October 30, 2023)

Tags: ,

Back to Blog

Related Articles

  • Password dictionary overview and best practice

    As long as users continue using common/predictable passwords, dictionary attacks will continue to work. Hackers are not the only ones who can take advantage of password predictability. The best protection against a dictionary attack is using a dictionary during the password creation process. This means checking future passwords against such dictionaries, and preventing users from…

    Read More
  • NIST password compliance guidelines – What they are and how you can meet them

    The new password guidelines from National Institute of Standards and Technology (NIST) are changing how companies and organizations view password security. The guidelines say: Do allow for longer passwords and choosing original secret questions, Don’t allow users to choose a password from a compromised list, or force password expiration without cause. These changes aim to…

    Read More
  • How to enforce password history in Active Directory

    The “Enforce password history” setting in Active Directory is used to determine the number of unique passwords a user must use before they can use an old password again. This is an important setting because password reuse is a common issue – the more often the same (or similar) password is used, the greater chance…

    Read More