Breach detection

Breach Detection continuously monitors credential databases across the internet to alert you the moment your organization's accounts appear in data breaches.

How Breach Detection Works

Continuous Data Monitoring

Sentry integrates with constantly updated breach databases and dark web monitoring services to track:

  • Major public data breaches (historical and new)

  • Credential dumps on hacking forums

  • Dark web marketplaces selling access credentials

  • Paste sites and leak repositories

  • Stealer malware logs

Monitored Email Addresses

Sentry automatically monitors:

  • All organization member email addresses

  • Email addresses associated with verified domains (@yourcompany.com)

  • Individual team member personal emails (with permission)

  • Service accounts and automated systems

Breach Intelligence

When credentials are found, Sentry provides:

  • Source of the breach (service name, breach date)

  • Types of data compromised (passwords, security questions, personal info)

  • Severity assessment based on data exposed

  • Whether passwords were hashed or plaintext

  • Estimated breach date and discovery date

Integration with Other Features

Tasks: Breach remediation actions automatically create tasks assigned to affected users.

Webhooks: Configure webhooks to forward breach alerts to Slack, Discord, PagerDuty, or your incident response platform.

Last updated