Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
  • Management
    1. Role-Based Access Control
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Secure Access (ZTNA)
    1. Configuration
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

Zero Trust Credentials

Our security extension takes control of the inputs to the web pages. Based on our AI, threat intel we will block the input fields and prevent potential phishing or spear-phishing attacks.

Visibility:

It is possible to get credential exposure reports regularly for an enterprise. In this report, per end user, each username/password exposed on the Internet are listed. This is the credentials risk your organization is exposed.

credentials%20exposure%20report%201

Protection:

The most secure model to minimize phishing risks is to whitelist the web sites those are trusted for credentials exposure. After getting the credentials visibility using the credentials exposure reports, DefensX enables an enterprise to limit end users putting their credentials only to these trusted domains. This is called zero-trust credentials and it magically prevents from the most of the phishing, spear-phishing and sophisticated social engineering attacks.

credentials%20exposure%20whitelist%201
www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013