DeHashed

DeHashed is the largest & fastest data breach search engine.

22 Alternatives To DeHashed

Aptible

Aptible is a secure, private cloud deployment platform built to automate HIPAA compliance.
images/2020/03/filevault.jpg}}

FileVault

FileVault is a method of using encryption with volumes on Mac computers.

Fileaudit

FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
images/2020/04/Firefox-Monitor.png}}

Firefox Monitor

Firefox Monitor arms you with tools to keep your personal information safe.

Hacksy

Security bot to make recommendations and update you on personal data leaks.

IBM Security Guardium

Meet critical compliance, privacy, data security and protection needs across on-premises, hybrid, and multi-cloud environments with IBM Security Guardium.
images/2020/04/LeakBase.png}}

LeakBase

Check if your account credentials have been leaked.

LeakCheck

Data breach search engine, low price starting from $10/mo, one email address for free, unlimited API, 7B+ entries

Leaksify

Check if you have an account that has been compromised in a data breach.

Leakwatch

We keep an eye on the web to detect your data leaks in real time and enable you to take actions…
images/2020/04/NuclearLeaks.png}}

NuclearLeaks

The biggest free-to-download collection of publicly available website databases for security researchers and journalists.
images/2020/04/Password-Checkup.png}}

Password Checkup

Password Checkup helps you resecure accounts that were affected by data breaches.
images/2020/04/SAP-NetWeaver.png}}

SAP NetWeaver

SAP NetWeaver enables the composition, provisioning, and management of applications across a heterogeneous software environment

Snusbase

The industry leading database lookup.
images/2020/04/Sophos-SafeGuard-Encryption.png}}

Sophos SafeGuard Encryption

Centrally managed full-disk and file encryption with options to synchronize with award winning Sophos endpoint protection for automated, proactive data protection.
images/2020/04/Spybot-Identity-Monitor.png}}

Spybot Identity Monitor

Get an overview where your account was leaked.
images/2020/04/StealthAUDIT-Management-Platform.png}}

StealthAUDIT Management Platform

STEALTHbits Technologies is a leader in the Microsoft Infrastructure and Application Management space, with solutions for Data Access Governance, Identity Access Management, Active Directory, and more.
images/2020/03/tinder.jpg}}

Tinder

Tinder is how people meet. It’s like real life, but better.