Preemptively Hunt & Capture
Compromised Login Credentials.

Premier cybercrime prevention software designed to defeat cyber criminals who attack employee, customer, and supply chain networks.


Locates the Global Known
& the Identified At-Risk.

CT6.® CredProtect proprietary processes (U.S. patent pending) provide the most comprehensive search of login credentials available, powerful enough to uncover hidden connections to compromised credentials (the Known Bad) and credentials stolen but not yet used by criminals (the Identified At-Risk). This insight preemptively stops fraud.

Cybercrime losses topped $1 Trillion in 2020 for the first time, up 50% from 2018. Compromised credentials are a leading cause of cybercrime financial losses and damaged corporate reputations.


Combines Advanced Technology & Premier Data Collection into one solution.

Unique to CT6.® CredProtect, we combine technology solutions and data collection solutions into a single platform. No existing market offering compares to CT6.® CredProtect advanced technology and data management to keep your networks safe while maintaining peak performance.


Flexibility Based on
Your Needs

CredProtect for Employees

Find compromised employee credentials to decrease vulnerabilities and risk of network exploitation.

CredProtect for Customers

Find customers with compromised credentials to decrease the risk of Account Take Over (ATO).

CredProtect for Supply Chain

Find compromised credentials belonging to vendors and other third parties to decrease the risk of Business Email Compromise (BEC).

While it is virtually impossible to stop credential compromise and theft, CredProtect locates and identifies at-risk credentials effectively neutralizing any theft or breach before it causes harm or loss.

Privacy and Search Accuracy Tool

The proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.)

Wide Aperture Data Hunting

A proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data. Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.)

IoFC® Matching Logic

A proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.)

IoFC® Cybercrime Risk Signaling

The product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.)

Criminal Behavioral Analytics

The process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business or organization. Customize by merging CT6.® risk signals and threat tags with any data or info.

See CT6.® CredProtect proprietary technology in a live demonstration to see firsthand why it is the optimum, most advanced technology available.

Stolen or Hacked Login Credentials


Confirmed At-Risk Identified
Identifies credentials that are compromised but not yet used in a crime

Discover compromised credentials before a criminal login event occurs

Flexible Integration
Can be deployed onsite or externally

Invisible, Frictionless Touch
Effective credential monitoring with no added burdens or processes to slow users

Other Technology-based Company Solutions:

At-Risk Not Identified
Waits for a criminal to use the compromised credential in a crime

Not Preemptive
A criminal login event must occur first

Not Flexible
Requires full integration into IT environment

Burdensome Infrastructure Required
Adds time to the login process resulting in end user increased friction


Access to the CredProtect Network
CredProtect Network includes unrelated third-party data breaches, old malware campaigns, inactive phishing campaigns, and more

No PII is exported from internal network reducing data vulnerability

Privacy Law Compliant
U.S. DOJ/ E.U. GDPR privacy laws compliant

Ethical data hunting and collection means criminals do not profit and stolen data is not trafficked by your company and vendor

Other Technology-based Company Solutions:

No Network
Results are limited to data sets purchased from dark Internet sources with limited scope and matches

Not Secure
Requires an export of PII from internal networks creating another vulnerability

Uncertain Privacy Compliant
Unproven based on data acquisition methods

Potential Ethical or Criminal Risk
May use unlawful practices for data acquisition which could complete the criminal-profit cycle and fund future hacks or fraud events

Unique to

CT6.® CredProtect began as a successful defense against compromised login credentials for a global financial institution that saved over $60 million.

Today, CT6.® CredProtect is the most advanced technology available to hunt and capture the compromised login credentials of employees, customers, and supply chain vendors and merchants.

Developed, Designed, Stored, and Operated entirely within the United States.

Ethical Data Hunting.

CT6.® CredProtect does not rely on purchased or trafficked stolen data like other companies do.


CT6.® CredProtect is the only truly preemptive solution to stop fraud before it happens. CT6.® CredProtect finds stolen credentials not yet used in a crime or login event.

Keeps Your Data Safe.

CT6.® CredProtect does not require PII of employees, customers or third parties. This information stays on your network where it belongs.

What is CredProtect Deep Dive Detection Technology?

Other companies simply buy and scan stolen data, then they send it to you. CredProtect utilizes proprietary data collection methodologies within extensive alternative data sources to connect the dots across disparate platforms to provide a superior set of results. While others merely pass along information, we create it.


Download our PDF

Premier cyber threat intelligence designed to defeat cybercriminals who attack employee, customer, and supply chain networks.