Skip to content Skip to footer

Breach Alarms

Breach Alarms

Breach alarms can be issued for either objectives or SLAs independently. A breach alarm is issued for an SLA when health rules that determine the health of the SLA is in violation. A breach alarm is issued for an objective when the objective is out of compliance (for example, it fails).

When an objective is halfway to a breach condition, the condition of the objective is Major (warning). This occurs even if you specify Minor as the option for what the objective should be when a violation is reached.

Additional Services

Constantly updated threat intelligence

Advanced Technology Platform

No half measures

On-premise and cloud data breach management

Why Brands Choose NexGen For Breach Alarms

Experience Led & Outcome Focused

We help brands understand the role digital can play in realizing strategic opportunities and solving real world business problems, always keeping the focus on the customer's experience and the results generated.

Proven, Rapid, Agile & Trusted Delivery Methods

Using agile methodology, always keeping you in the loop. Streamlined delivery, cost effective engagements, designed to match your goals, your timeline and your budget.

Experienced Developers

Our mobile web developers create solutions that work seamlessly across all platforms and operating systems: smartphone, tablet or laptop or running iOS, Android. 

Transparent, Collaborative, Communicative

Complete project visibility and multiple open lines of communication from day one. We are available when you need us and continually updating you on your project’s status.

FAQs

When you perform a check on our homepage, your email address is used in a single check against our database. We’ll use it to send you a copy of the results of that check, and to follow up with advice on how to protect yourself. You can opt out of receiving these follow-up emails at any time.
This website is part of the Avalanche Technology Group, with over a decade of experience making life easier, safer, and happier. This is not a phishing site and has been vetted by a number of trustworthy individuals and organisations (see media).
Absolutely not. Your email address is used in a single database query. We will only store your email address if you create an Email account.
Hackers work hard to hack into websites and steal their data. They often post this information online for “lulz” or notoriety. We collect the data hackers release to the public, which often contain email addresses and passwords. In this case, one of the websites that you’ve created an account with has probably been compromised, and your details published online.