RiskProfiler delivers comprehensive threat intelligence across External Attack Surface Management (EASM), brand protection, dark web monitoring, and vendor risk assessment. I was particularly impressed by their physical threat monitoring modules, which enable real-time surveillance of business locations directly through the same intuitive dashboard. The platform is extremely user-friendly, offering smooth navigation and easy accessibility. Their support team is responsive, providing thorough and timely assistance. Data visualization is strong, with real-time updates reflected through clear, easy-to-understand graphs and charts. Additionally, the platform's streamlined workflows and automation significantly reduce time and operational effort, offering a truly holistic threat monitoring solution in one centralized interface. Review collected by and hosted on G2.com.
While the support team is responsive, the overall response time could be further improved for even better user experience. Review collected by and hosted on G2.com.
RiskProfiler delivers automated remediation workflows that trigger in real time to mitigate emerging risks. Its robust threat intelligence covers external vulnerabilities, data leaks, brand threats, and vendor risks. The platform’s dashboard is intuitive, offering clear, accessible insights, while the support team ensures prompt and comprehensive assistance.
RiskProfiler's EASM solution excels at asset discovery, enabling continuous monitoring of code repositories, backup files, emails, website licensing, typosquats, open ports, unregistered IP addresses, domains, mobile applications, and more. The platform’s multiple dashboard views provide a detailed, segmented understanding of vulnerabilities, enhancing the comprehensiveness of the data. Review collected by and hosted on G2.com.
Dashboard complexity can lead to information overload in some cases Review collected by and hosted on G2.com.
The platform comes with an intuitive dashboard for tracking specific security risks with easy navigation. The data on EASM, brand risk, supply chain risks, and security gaps can be monitored and analysed with accurate contextual threat data. The dashboard also allowed us to track vendor communication, mitigation progress, and questionnaire status on the dashboard. The risk rating and prioritization make the remediation process more efficient. They also offer multiple integration options for different tools and services used in your business for a comprehensive security setup. Review collected by and hosted on G2.com.
We didn’t have any complaints. The lack of a mobile interface, however, limits ease of accessibility. Review collected by and hosted on G2.com.
The tool helped us discover some critical issues in our external system. The solution offers a clean dashboard, which is easy to navigate, and offers good visibility. The EASM solution is a good tool for discovering problems with APIs, endpoints, DNS security, ports, mobile apps, subdomains, and configurations. They offer a detailed view of all cloud assets, attack paths, and breach details. Their supply chain solution helped us discover some underlying, undetected threats in our vendor’s extended supply chain. The brand intelligence tool detects and takedown typosquat and other fake domains along with phishing campaigns, and targeted attacks effectively. We could successfully discover and dismantle a chain of negative campaigns on social media with the help of their brand intelligence tool Review collected by and hosted on G2.com.
Our team hasn’t found any major flaws in their solution so far. However, the dashboard view can be complex and better suited for larger organizations. Review collected by and hosted on G2.com.
RiskProfiler offers automated remediation workflows that get triggered to mitigate risks in real time. Its threat intelligence provides comprehensive data on external vulnerabilities, data leaks, and brand and vendor threats. The dashboard is accessible and easy to understand. Their support team provided fast query responses with all the necessary guidance. The EASM service is a great tool for discovering assets, tracking code repositories, backup files, emails, website licensing, typosquats, and other vulnerabilities. It also helps you monitor and discover ports, unregistered IP addresses, domains, mobile apps, etc for better security. They offer great usability with multiple dashboard views for a detailed understanding of different vulnerabilities, which makes the data more comprehensive. Review collected by and hosted on G2.com.
The dashboard is complex and presents more data points than required in some cases. Review collected by and hosted on G2.com.
RiskProfiler offers comprehensive threat intelligence for complex vulnerabilities and security threats. It had a friendly dashboard UI where we could access information easily with great visibility. The CVE and cloud security detection scores helped us monitor the overall security posture at any given time. The solution also monitors the security posture continuously and offers intelligence with any changes detected on it. The security score helped us with risk prioritization and resource assignment. RiskProfiler also allows compliance status monitoring and automates the management process. The tool has an in-built collaboration channel to communicate with vendors for security risk maintenance. Review collected by and hosted on G2.com.
The unavailability of the pricing point on the website creates some confusion. Review collected by and hosted on G2.com.
RiskProfiler’s external threat intelligence offer good support to our team in discovering shadow assets and gaps. Their UI dashboard offers excellent visibility to access all necessary information on beach history, timelines, and data with severity scoring to keep track of the security posture. However, we found their TPRM solution to be the most valuable, along with the automated vendor risk questionnaire. The questionnaire gets triggered automatically. Review collected by and hosted on G2.com.
We didn’t dislike anything about their service. Review collected by and hosted on G2.com.
The holistic intelligence makes monitoring the threat posture easier. The dashboards are
smooth and offer critical insights with simpler presentation. The tool is easy to navigate
and offers multiple dashboards to track different threat categories. Intelligence comes
with all the necessary information like timeline, past breaches, sources, and impact
scoring. They also helped us monitor and discover vulnerabilities in mobile applications
and the proper remediation plans to fix the issues. The CVE tracker is efficient in
discovering vulnerabilities with the timeline and source code. Review collected by and hosted on G2.com.
The support team is a great help but needs to get back to the queries a bit faster. Review collected by and hosted on G2.com.
Riskprofiler offers fast on boarding, the initial integration setup took less than 30 minutes. They monitor threat posture continuously and updates on the changes in security profile accordingly. The solution comes with easy and multiple integration options with user friendly dashboard. Their customer support team were professional with their timely responses. Review collected by and hosted on G2.com.
I did't find much to dislike. But the solution can be complex for a users little to no technical expertise. Review collected by and hosted on G2.com.
The platform offers continuous monitoring and fast detection. The dashboard updates with any changes in overall security with detailed risk scoring helping us stay prepared. The platform sent us alert with detailed threat context for informed decision. We can also monitor the progress report on vendor threats remediation and collaboration. The support staff is really helpful. Review collected by and hosted on G2.com.
I'm using this service for more than one year and didn't face any trouble. Review collected by and hosted on G2.com.