Product
Use cases
Resources
About
Pricing
Product
Use cases
Resources
About
Pricing
Explore use cases
Zero-day phishing protection

Detect phishing TTPs directly in the browser and stop credential theft.

Account takeover detection

Stop ATO with in browser detection

Identity security posture

Find and fix identity risks in real time.

Identity investigation and response

Investigate and respond with browser telemetry.

Secure shadow SaaS

See and control shadow SaaS in the browser.

Push Security logoPush Help Center
Ready to help
Help for administrators
Help for admins
Help for employees
Help for employees
Help for administrators
Help card decoration image
Privacy and security
How Push protects employee accounts and data online while respecting privacy
What is consent phishing?
How does the Push browser extension securely analyze passwords?
How does Push determine if a password is leaked or weak?
How does Push evaluate passwords containing words restricted by an administrator?
Has Push received SOC 2 attestation?
Can Push identify which password managers employees are using?
Can I restrict which websites Push monitors or temporarily disable the extension?
How does Push assign a severity level to detections?
Need more help?
Questions, feedback, tech support, sales support - anything you need.
We’ll get back to you within a day.
Logo
Subscribe to get updates from Push
The latest news, articles, and resources, sent to your inbox
Product
FAQs
Pricing
Demo
Resources
Blog
Help center
Content
Status
Supported apps
About
About
The team
Investors
News
Contact
Careers
Assurance
Security
Privacy policy
Cookie policy
Terms
Sub-processors
Data processing agreement
© Push 2025. All rights reserved.
Clear cookies
AICPA SOC CertifiedGDPR CompliantCyber Essentials
You're offline. Waiting to reconnect.