STOP CYBERCRIME. RESTORE CONFIDENCE.
Preemptively Hunt & Capture
Compromised Login Credentials.
Premier cybercrime prevention software designed to defeat cyber criminals who attack employee, customer, and supply chain networks.
CREDPROTECT
Locates the Global Known
Bad & the Identified At-Risk.
CT6.® CredProtect proprietary processes (U.S. patent pending) provide the most comprehensive search of login credentials available, powerful enough to uncover hidden connections to compromised credentials (the Known Bad) and credentials stolen but not yet used by criminals (the Identified At-Risk). This insight preemptively stops fraud.
Cybercrime losses topped $1 Trillion in 2020 for the first time, up 50% from 2018. Compromised credentials are a leading cause of cybercrime financial losses and damaged corporate reputations.
CREDPROTECT
Combines Advanced Technology & Premier Data Collection into one solution.
Unique to CT6.® CredProtect, we combine technology solutions and data collection solutions into a single platform. No existing market offering compares to CT6.® CredProtect advanced technology and data management to keep your networks safe while maintaining peak performance.
CT6.® CREDPROTECT
Flexibility Based on
Your Needs

While it is virtually impossible to stop credential compromise and theft, CredProtect locates and identifies at-risk credentials effectively neutralizing any theft or breach before it causes harm or loss.

![]() |
Privacy and Search Accuracy ToolThe proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.) |
![]() |
Wide Aperture Data HuntingA proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data. Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.) |
![]() |
IoFC® Matching LogicA proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.) |
![]() |
IoFC® Cybercrime Risk SignalingThe product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.) |
![]() |
Criminal Behavioral AnalyticsThe process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business or organization. Customize by merging CT6.® risk signals and threat tags with any data or info. |
See CT6.® CredProtect proprietary technology in a live demonstration to see firsthand why it is the optimum, most advanced technology available.
Stolen or Hacked Login Credentials
CredProtect
Confirmed At-Risk Identified
Identifies credentials that are compromised but not yet used in a crime
Preemptive
Discover compromised credentials before a criminal login event occurs
Flexible Integration
Can be deployed onsite or externally
Invisible, Frictionless Touch
Effective credential monitoring with no added burdens or processes to slow users
Other Technology-based Company Solutions:
At-Risk Not Identified
Waits for a criminal to use the compromised credential in a crime
Not Preemptive
A criminal login event must occur first
Not Flexible
Requires full integration into IT environment
Burdensome Infrastructure Required
Adds time to the login process resulting in end user increased friction
CredProtect
Access to the CredProtect Network
CredProtect Network includes unrelated third-party data breaches, old malware campaigns, inactive phishing campaigns, and more
Secure
No PII is exported from internal network reducing data vulnerability
Privacy Law Compliant
U.S. DOJ/ E.U. GDPR privacy laws compliant
Ethical
Ethical data hunting and collection means criminals do not profit and stolen data is not trafficked by your company and vendor
Other Technology-based Company Solutions:
No Network
Results are limited to data sets purchased from dark Internet sources with limited scope and matches
Not Secure
Requires an export of PII from internal networks creating another vulnerability
Uncertain Privacy Compliant
Unproven based on data acquisition methods
Potential Ethical or Criminal Risk
May use unlawful practices for data acquisition which could complete the criminal-profit cycle and fund future hacks or fraud events

Unique to
CredProtect
CT6.® CredProtect began as a successful defense against compromised login credentials for a global financial institution that saved over $60 million.
Today, CT6.® CredProtect is the most advanced technology available to hunt and capture the compromised login credentials of employees, customers, and supply chain vendors and merchants.
Developed, Designed, Stored, and Operated entirely within the United States.
What is CredProtect Deep Dive Detection Technology?
Other companies simply buy and scan stolen data, then they send it to you. CredProtect utilizes proprietary data collection methodologies within extensive alternative data sources to connect the dots across disparate platforms to provide a superior set of results. While others merely pass along information, we create it.

FIND OUT MORE
Download our PDF
Premier cyber threat intelligence designed to defeat cybercriminals who attack employee, customer, and supply chain networks.