5.0 out of 5 stars

RiskIQ provides enterprise security beyond the firewall, protecting web assets and apps from malware, fraud and brand infringements.

Work for RiskIQ?
Alienvault usm  vm  2x

Learning about RiskIQ?

We can help you find the solution that fits you best.

RiskIQ Reviews

Ask RiskIQ a Question
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
User Industry
Showing 1 RiskIQ review
LinkedIn Connections
RiskIQ review by User in Accounting
User in Accounting
Validated Reviewer
Verified Current User

A must have solution today in Cyber security Investigations, CERTs and SOCs

Reviewed On
What do you like best?

This a very innovative solution, it si built from the ground up with the user in mind. There aren't many competitors in this space that can provide the same solution. RiskIQ has also made a huge contribution to the community spreading the voice and discovering how attackers are using the external threat surface of organizations to get a monetary gain.

What do you dislike?

The solution addreses threats and modus operandi of current cyber threats amongst other issues, If I could make a request it would be for RiskIQ to provide even more free resources and documentation out there in order to make this solution and knowledge reach the masses.

Recommendations to others considering the product

RiskIQ's solution, expertise and team make them leaders in their space. There is no other provider today that can offer the same value and insight in the industry as they do.

Their customer success team is very supportive and they will ensure that you successfully use and receive the benefits of their platform.

What business problems are you solving with the product? What benefits have you realized?

The solution allows any organization to maintain their external assets under control, from brand to mobile applications and web. Having visibility of these assets makes possible to secure them and maintain them under control to avoid cyber breaches.

It also allows to defend my organization against the most elusive threats available on the internet today

Sign in to G2 Crowd to see what your connections have to say about RiskIQ

What Vulnerability Management solution do you use?

Thanks for letting us know!

There are not enough reviews of RiskIQ for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

SpyBot Logo
Finds and destroys spyware, malware, adware and other malicious software
SolarWinds Patch Manager Logo
SolarWinds Patch Manager
SolarWinds Patch Manager integrates with WSUS and Microsoft update agent, and automatically updates Windows patches based on custom schedules. In addition, you can create different patching schedules for different business groups within the organization per custom requirements.
Sophos UTM Logo
Sophos UTM
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
Acunetix Vulnerability Scanner Logo
Acunetix Vulnerability Scanner
Acunetix Vulnerability Scanner automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities. It also provides a wide variety of reports to help developers and business owners alike to quickly identify a web application’s threat surface, detect what needs to be fixed, and ensure conformance with several compliance standards.
Qualys Logo
Vulnerability Management
Atera Logo
Atera It is the only All-in-One SaaS Based software for Managed Service Providers (MSPs), combining remote monitoring and management (RMM), professional services automation (PSA) and remote control & support.
Ghostery MCM Logo
Ghostery MCM
Ghostery Mcm Helps You Speed Up, Clean Up, And Lock Down Your Sites And Apps.
Tripwire Enterprise Logo
Tripwire Enterprise
Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats
Cyberoam UTM Logo
Cyberoam UTM
Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations.
Change Tracker Gen7 Logo
Change Tracker Gen7
NNT Change Tracker Generation 7 uses either an agent-based or agentless architecture. After initial discovery, NNT-Change Tracker scans your devices and compares them to a standard policy.
Show more
Kate avatar
Kate from G2 Crowd

Learning about RiskIQ?

I can help.
* We monitor all RiskIQ reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.