61 Dark Web ID Reviews
Overall Review Sentiment for Dark Web ID
Log in to view review sentiment.

It has been helpful for security. The platform gives you an eye on any sign of our data being on risked or data breach. Review collected by and hosted on G2.com.
I don't find any dislike thing right now. Review collected by and hosted on G2.com.
It Constantly checks the dark web for checking the stolen or compromised data. it provides detailed reports on the types and source of compromised data. the plateform is designed to be user-freindly. Review collected by and hosted on G2.com.
The system can produce false positive sometimes which becomes unrealistically hard to beleive the data shown is correct or not. Review collected by and hosted on G2.com.

It is very helpful to find whether our account is compromised or not. Review collected by and hosted on G2.com.
No dislike.what I want is therein Dark Web ID Review collected by and hosted on G2.com.
It has better dark web source than others. Also, it's other features such as supply chain monitoring, Bullphish ID cybertraining and phishing simulations, etc are included in DWID. Review collected by and hosted on G2.com.
Listed leaked datas are not attributed to what leaked them or sources. Review collected by and hosted on G2.com.

The confidentiality of identity is the best. Review collected by and hosted on G2.com.
Many frauds and data breach occurs using such platform. Review collected by and hosted on G2.com.

Ease of use with clear explanation of features Review collected by and hosted on G2.com.
Onboarding process can be improved a bit Review collected by and hosted on G2.com.

easy to use and light tool
I recommend to everyone Review collected by and hosted on G2.com.
It didn't give alot of information about breaches Review collected by and hosted on G2.com.

The most helpful insight I've noticed about Dark Web ID is being able to compare the types of exposed credentials against out newly enhanced IT security practices and measure effectiveness. Review collected by and hosted on G2.com.
I hope that a more detailed explanation of the source of compromise can be added into this product. Review collected by and hosted on G2.com.
Emails alert you on what the breach is, and roll up monthly emails help to keep track of what the tool has done for the clients. Review collected by and hosted on G2.com.
While it's basically something baked into a lot of other software these days, or identity theft resources, this goes a little above and beyond. I wish that it could identify when an old breach resurfaced and that there were options to ignore those once they have been communicated to the client and passwords changed. Review collected by and hosted on G2.com.

The monitor service is great and has allowed us to look like super hero's to some of our clients. The notifications on discovery of credentials have been really great Review collected by and hosted on G2.com.
Navigation within the interface could be better Review collected by and hosted on G2.com.