Continuously block compromised passwords
The threat organizations face is a daily one. Microsoft cites 1,287 password attacks happen every second. Users have too many passwords to manage and therefore reuse passwords, opening up more opportunities for an attacker to gain entry into your network. With the Breached Password Protection service, Specops Password Policy can block the use of more than 4 billion unique known compromised passwords. The service checks for passwords found in leaked data, malware botnets, as well as passwords found by our extensive honeypot system that monitors for passwords being used in brute force attacks happening right now.Read More
The Breached Password Protection database offers continuously updated protection that can run on a daily scheduled scan of your Active Directory. The daily update of the Breached Password Protection service, paired with continuous scans for the use of those passwords in your network, equals a much more comprehensive defense against the threat of password attack and the risk of password reuse.
Create compliant password policies
Simplify passwords for users and place the burden on authentication systems. It has never been easier to comply with regulatory password recommendations from NIST, CJIS, NCSC, ANSSI, CNIL, BSI, HITRUST, PCI and more. With compliance driven templates, and a reporting tool to ensure they match or exceed regulatory standards, Specops Password Policy makes compliance a breeze.Read More
Do you know how your existing password policies compare to best practices? For each password policy, you can drill down and see how the settings compare to various industry standards. Measuring your policies against industry recommendations can help safeguard your organization against common password-related attacks, including brute-force, rainbow table, and dictionary attacks.
Target password entropy
Specops Password Policy enforces password length and complexity while blocking common character types at the beginning/end of passwords, as well as consecutively repeated characters. To help users create stronger passwords they can actually remember, the solution also supports passphrases.Read More
Password attacks work because users are predictable. When asked to create a complex password, users follow familiar patterns. This means starting with a common word, followed by a number and/or special character. The length of the password is an effective defense. Passphrases, a combination of words that are meaningless together, are easier to remember and harder to crack.
Sound like a good fit?Get in Touch
- Custom dictionary lists to block words common to your organization
- Prevent the use of more than 4 billion unique compromised passwords with Breached Password Protection which includes passwords found on known breached lists, in malware botnets, as well as passwords being used in attacks happening right now
- Continuously find and remove compromised passwords in your environment from a daily updated database
- Informative end-user client messaging at failed password change that reduces calls to the helpdesk
- Real-time, dynamic feedback at password change with the Specops Authentication client
- Length-based password expiration with customizable email notifications
- Block user names, display names, specific words, consecutive characters, incremental passwords, and reusing a part of the current password
- Granular, GPO-driven targeting for any GPO level, computer, user, or group population
- Passphrase support
- Over 25 languages supported including English, French, German, Spanish, Russian and Chinese
- Use Regular Expressions to further customize requirements
Easy and Intuitive to Use
Try it for FREE, today!
Please fill in your information to start your free trial. All fields are mandatory.
Frequently Asked Questions
Allows our users to be autonomous
“Specops is a very complete solution that has largely fulfilled its objectives within our company. Thanks to this solution our users are totally autonomous to change their passwords”
The Strongest Password Tool Ever!!!
“It has a lot of good features that you configure to make policy strongest. And it’s very good buy this tool with express list API very useful to assign your policy with external data breach list.”
Easy, fast to deploy, immediate return of investment
“Deployed to 400 users in one hour with help of support. Support was really helpful, and whole process from testing to buying was fast & convincing.”
Introducing Live Attack Data to Specops Breached Password Protection (plus what passwords you should block right now)
Timothy Warner, “If your Active Directory password policy isn’t flexible enough for you, then I suggest you give Specops Password Policy a try.”Full Review
Brien Posey, “I found the software to be stable, reliable, and very responsive. I did not encounter any bugs during my review, and the software was intuitive to the point that I was able to use it without ever looking at the instructions or calling tech support.”Full Review