RiskProfiler Threat Intelligence
RiskProfilerReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
91 reviews
from
External reviews are not included in the AWS star rating for the product.
Unified Cyber Threat Intelligence for Enhanced SOC Alerts
What do you like best about the product?
RiskProfiler provides comprehensive threat intelligence on external, brand, and supply chain risks, which has helped us enhance our SOC alerts to a great extent. The solution provides contextual threat data with complete attack paths mapping from the potential breach entry point to the target asset. The setup is fast and guided.
What do you dislike about the product?
Even though the UI/UX is great, the customization options could be improved.
What problems is the product solving and how is that benefiting you?
It improved our threat detection and response protocols with its proactive, contextualized intelligence. We do not need to depend on multiple tools to find the risk information.
Early Detection of Attacker Infrastructure for Executive Risk Reduction
What do you like best about the product?
We value how RiskProfiler blends automation with contextual insight. The detection of phishing kits targeting our executives and real-time alerting on new infrastructure spoofing our brand have been major benefits.
What do you dislike about the product?
Mobile app support is still in early stages; I would appreciate faster development there.
What problems is the product solving and how is that benefiting you?
It's allowing our security team to shift from reactive incident response to proactive risk reduction, especially in detecting early-stage attacker infrastructure setup.
Reducing Unknowns in Partnership Pipelines with Threat Surface Intelligence
What do you like best about the product?
We used RiskProfiler during due diligence for a recent partnership and found it extremely useful in mapping the target company’s external exposure. It flagged stale domains and cloud storage misconfigurations that we wouldn’t have found otherwise.
What do you dislike about the product?
Cross-environment comparison took some manual effort.
What problems is the product solving and how is that benefiting you?
We were able to significantly reduce the inherited threat surface shortly after integration, ensuring a more secure and compliant transition.
High-Fidelity Forensics and Monitoring for Scalable Brand Protection
What do you like best about the product?
Their Brand Intelligence module is particularly strong. It catches impersonation attempts across marketplaces, social platforms, and domain squatters. We receive high-quality screenshots and forensic data that help our legal team escalate takedown requests swiftly.
What do you dislike about the product?
The takedown service is excellent, but it would be even better if it had a few more language options for international and regional threat detection.
What problems is the product solving and how is that benefiting you?
RiskProfiler protects our brand equity by ensuring any misuse, fake listings, or phishing domains are detected early. It has helped us build consumer trust by eliminating fraudulent sites before they cause real damage.
Dynamic Threat Surface Control Across Shadow IT and Legacy Domains
What do you like best about the product?
We like the continuous asset discovery and alerting mechanism that updates in near real-time. As our company grew quickly through acquisitions, RiskProfiler helped us detect overlooked domains and deprecated IPs that were still vulnerable.
What do you dislike about the product?
We faced occasional delays in syncing results with internal SIEMs, though support was responsive.
What problems is the product solving and how is that benefiting you?
RiskProfiler helps us maintain control over an expanding attack surface by auto-discovering and monitoring exposed assets across acquired entities, third-party platforms, and shadow IT endpoints.
Real-Time Cloud Asset Intelligence for Zero-Trust Environments
What do you like best about the product?
RiskProfiler’s continuous discovery of cloud-based assets, including orphaned and misconfigured S3 buckets or forgotten DNS records, makes it indispensable in our hybrid environment. The auto-tagging of assets by sensitivity level and location is a great touch.
What do you dislike about the product?
Integration with certain regional cloud providers requires more manual tuning.
What problems is the product solving and how is that benefiting you?
We no longer rely on manual audits or guesswork to track cloud exposure. With its real-time scanning and visibility, we’ve strengthened our zero-trust posture and improved compliance tracking across dynamic environments.
Reducing Alert Fatigue Through Exploitability-Based Threat Prioritization
What do you like best about the product?
RiskProfiler’s contextual threat scoring system helps us move past generic CVSS ratings. It contextualizes findings based on exploitability, brand impact, and exposed asset importance, which allows our team to prioritize limited resources toward the highest-risk threats better.
What do you dislike about the product?
Improving customization in the scoring logic to tailor can improve the overall experience.
What problems is the product solving and how is that benefiting you?
It eliminates noise from surface-level vulnerability scans and lets us focus on exploitable exposure with business impact. This has led to reduced alert fatigue and improved MTTR (mean time to respond).
Platform-Wide Visibility and Prioritization for Cross-Functional Security Teams
What do you like best about the product?
The platform centralizes discovery, monitoring, and prioritization of external-facing digital assets. We particularly appreciate how it combines visibility with actionable threat intelligence, giving our security operations team a strategic edge. The unified dashboard integrating attack paths, phishing indicators, and cloud misconfigurations is an enormous timesaver.
What do you dislike about the product?
Some training was required to effectively use all modules in tandem, especially for junior team members unfamiliar with exposure management platforms.
What problems is the product solving and how is that benefiting you?
It helps us stay ahead of external threats through dynamic asset discovery and proactive exposure reduction. The consolidation of shadow IT detection, cloud misconfigurations, and phishing indicators enables us to enforce better risk governance and accelerate remediation.
Comprehensive Attack Surface Discovery and Threat Path Simulation in One Platform
What do you like best about the product?
The Recon RiskProfiler module offers comprehensive external attack surface management by identifying unmanaged assets and potential vulnerabilities. Its ability to simulate attack paths provides valuable insights into how threats could exploit our systems
What do you dislike about the product?
The volume of data presented can be daunting, at times, but it helps with accurate and timely threat response.
What problems is the product solving and how is that benefiting you?
By uncovering hidden assets and mapping potential attack vectors, RiskProfiler enables us to fortify our defenses and reduce the likelihood of successful cyberattacks.
Consolidated Cloud Exposure Intelligence for Proactive Risk Mitigation
What do you like best about the product?
The Cloud attack surface management module provides real-time visibility into our cloud environments, identifying misconfigurations and exposed assets. Its integration with cloud provider services ensures that we can promptly address vulnerabilities specific to our cloud infrastructure in one dashboard, without having to juggle between too many tools.
What do you dislike about the product?
The alert volume can occasionally spike during infrastructure changes, which requires brief tuning to avoid redundant notifications during planned deployments.
What problems is the product solving and how is that benefiting you?
RiskProfiler strengthens our cloud security by identifying vulnerabilities specific to cloud workloads, enforcing best practices, and reducing the likelihood of misconfigurations being exploited. It ensures that our cloud infrastructure aligns with both internal policies and external compliance standards.
showing 11 - 20