top of page

Email Reputation

Email. Everybody Has It. But How Secure Is It, Really?

Email is NOT a secure communication channel and if it is your critical link and identifier for customers and employees, how serious are you about ensuring they are real and/or not compromised??

Our Email Reputation solution is an easy-to-use API showing the likelihood that an address is created-for-fraud, or if criminals have access to the email box, and if so, when and what were they looking for.

Image by Stephen Phillips - Hostreviews.co.uk
Focused Office Workers

How Companies Are Using
Email Reputation

For most companies, email is relied upon as the key unique identifier for customers and employees. It is used at new account openings to determine if the account is new, old, or from an existing client. Companies assume emails are real and secure, and that they are being received by a real account holder, which is why most companies use email as an additional method for authentication or account recovery, as well as a means to confirm sensitive customer instructions. The fact is, that is not always true and the consequences can be heavy, which is s why companies use our Email Reputation service.

  • At Account Creation to check:

    • If the email works.

    • If the email is synthetic.

    • If the email is known to be compromised.

  • At Login with email 2FA or when a password  change is requested:

    • Confirm if email is compromised before allowing a password reset by email, an email sign-in link, or new account signup (this prevents sleeper and protects trusted accounts from bad actors).

    • Establish a decision point to force step-up authentication.

    • Alert key customers of compromised email accounts.

  • When a sensitive transaction is initiated:

    • Before sending highly-sensitive email.

    • Confirm end user authentication on large transactions.

    • Authenticate the legitimacy of high-risk accounts/transactions while conducting breach investigations.

Image by Kit (formerly ConvertKit)
Powerful, Vigilant, Easy-to-Use

A simple API call for any email address that needs checking. Our API responses let you know if we've seen the email address before, if it has been accessed by criminals and, if so, when it was accessed, and for what purpose. Straightforward enough to use in any of your business systems.

A-BKGD-1s-0s-Teal-Full.avif

Email Reputation by the Numbers...

35+

BILLION

Compromised Credential Pairs

Leverage our proprietary data repository to find unique pairs of compromised emails, passwords, and user IDs.

15

MILLION

Credentials
Added Daily

By monitoring live bad actor traffic, we add millions of newly compromised credentials each day.

150

THOUSAND

Email Addresses
Added Daily

We never stop adding compromised emails accounts to our data base. These are emails that criminals are actively using.

Request Free 15-Minute Demo

“A top 10 U.S. brokerage used myNetWatchman to identify over $700,000 in ATO fraud attempts via a malicious actor’s access to customer’s email.”

See More of myNetWatchman’s Suite of Proactive Threat Protection Solutions

See More of myNetWatchman’s Suite of Proactive Threat Protection Solutions

bottom of page