4.9
280 Reviews (All time)
Review weighting

Browse RiskProfiler Reviews

RiskProfiler is present in 5 markets with 5 products. RiskProfiler has 280 reviews with an overall average rating of 4.9.

Brand Protection Software

Brand Protection Software is designed to monitor and detect infringements related to a company’s brand, employees, and products or services. These infringements may include fake domains, phishing websites, rogue or counterfeit apps, and impersonation through social media accounts. It also covers the unauthorized sale of counterfeit goods on online marketplaces, as well as misuse of company logos, images, and other intellectual property. The analytics generated by brand protection tools offer insights into a brand’s exposure and provide actionable recommendations to enhance its online presence. This is supported by holistic workflows and interactive reporting features that improve content management. Additionally, brand protection may involve sentiment analysis and narrative intelligence to assess public perception and identify any targeted disinformation campaigns. These solutions help organizations prevent reputational harm and financial losses resulting from fraud and cybercrime. These solutions are primarily used by teams across security, fraud, trust, brand, marketing, and legal functions within an organization.

RiskProfiler has 1 product in Brand Protection Software market

External Attack Surface Management

External attack surface management (EASM) refers to the processes, technology and professional services deployed to discover internet-facing enterprise assets and systems and exposures that could be exploited by malicious threat actors. EASM is useful in identifying unknown assets and providing information about the organization’s systems, cloud services and applications that are available and visible in the public domain and therefore can be exploited by an attacker/adversary. This visibility can also be extended to the organization’s subsidiaries or third parties. EASM are most commonly cloud-based products and services but can also be delivered ‘as a service’. EASM appeals to security operations functions involved with penetration testing, vulnerability management and threat hunting who want better visibility of their internet-facing assets to complement their threat and exposure management program.

RiskProfiler has 1 product in External Attack Surface Management market

IT Vendor Risk Management Solutions (Transitioning to Third-Party Risk Management Technology Solutions)

Gartner defines IT vendor risk management (IT VRM) as the discipline of addressing the residual risk that businesses and governments face when working with external service providers, IT vendors and related third parties. The scope typically addresses risks related to data protection, business continuity, security and other risk domains as relevant to laws, regulation and industry practices.

RiskProfiler has 1 product in IT Vendor Risk Management Solutions (Transitioning to Third-Party Risk Management Technology Solutions) market

Third-Party Risk Management Technology Solutions

The third-party risk management (TPRM) technology market offers solutions to identify, assess, manage, monitor and report on third-party risks associated with vendors, suppliers, distributors, agents, partners or other third parties. Solutions in this market can support a wide range of TPRM workflows across various risk domains. TPRM platforms in this market address the needs of a diverse range of customers and risk domains, including legal, compliance, procurement, supply chain, IT, cybersecurity and other teams that work with or provide routine oversight of third parties. Some technology solutions offer enterprise third-party risk management workflow as a feature, along with risk tiering, due diligence, risk mapping, metrics and reporting mechanisms. Other platforms may facilitate integration with risk data subscriptions, data aggregators or other subscriptions. The TPRM technology market is a complex array of solutions servicing many business functions across an enterprise. TPRM solution providers can be categorized into technology platforms and tools, or risk-domain-specific data and insights.

RiskProfiler has 1 product in Third-Party Risk Management Technology Solutions market

Vulnerability Assessment

VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools

RiskProfiler has 1 product in Vulnerability Assessment market