Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

116 reviews
from

External reviews are not included in the AWS star rating for the product.


    Kanishk S.

Proactive Exposure Detection with Continuous Cyber Threat Intelligence

  • August 27, 2025
  • Review provided by G2

What do you like best about the product?
I like that it works quietly in the background but is relentless in surfacing issues. We started seeing external exposures and partner risks almost immediately after setup. The continuous flow of intelligence, including brand misuse indicators, feels tailor-made for a research-driven environment like ours.
What do you dislike about the product?
Alert customization can take time. Adjusting noise levels so teams don’t get distracted requires a bit of trial and error.
What problems is the product solving and how is that benefiting you?
We no longer wait for quarterly audits to discover problems. The system pushes exposures as they appear, helping us stay ahead of attackers and enabling faster AI-powered triage.


    Information Technology and Services

Attack Path Insights Built for Strategic Security Planning

  • August 26, 2025
  • Review provided by G2

What do you like best about the product?
The attack path view and associated CVEs give us a clear story about how attackers might move laterally from exposed surfaces to sensitive services. Beyond that, it was up and running within the hour. Support stayed engaged through onboarding, and the interface is logical and fast to explore.
What do you dislike about the product?
It lacks a companion mobile app for research during off-site events. A read-only mode for mobile would be enough.
What problems is the product solving and how is that benefiting you?
Helps us explain risk upstream—how an exposed asset relates to actual compromise. That insight helps drive buy-in from product teams and execs alike.


    Information Technology and Services

Compliance and Supply Chain Assurance

  • August 26, 2025
  • Review provided by G2

What do you like best about the product?
What stood out for me is how quickly RiskProfiler was live, cause by the end of the first day we already had vendor exposure reports and external scans. The supply chain focus and its ability to highlight compliance-related risks make it especially valuable in our regulated environment.
What do you dislike about the product?
Their vendor risk and compliance assessments are a huge help, but more customization options would make them even better for suppliers with diverse profiles.
What problems is the product solving and how is that benefiting you?
Previously we were piecing together supplier risks from multiple tools. Now we have one stream of data on external, vendor, and brand threats that supports both security and compliance reviews.


    Information Technology and Services

Built to grow with your security team

  • August 26, 2025
  • Review provided by G2

What do you like best about the product?
The platform scales effortlessly. The asset inventory continuously updates itself, and the fast takedown flow for phishing domains helps us enforce brand protection quickly. The initial configuration is quick, completes within an hour. We were already seeing alerts roll in. Plenty of integration options for a broad security posture.
What do you dislike about the product?
More advanced filtering or automation in alert noise reduction would help avoid repetitive triage for know issues.
What problems is the product solving and how is that benefiting you?
We lacked real-time visibility across our external assets. Riskprofiler's continuous discovery and brand impersonation alerts give us a living map of our exposure and help us act before attackers do.


    Yaakesh G.

Rapid Setup with Deep Attack Surface Insight

  • August 25, 2025
  • Review provided by G2

What do you like best about the product?
Setup took less than half an hour and the platform immediately started scanning our perimeter. I really appreciate how it keeps resurfacing risks across suppliers and even brand misuse attempts. For an AI-first company like ours, the speed and clarity of the intelligence stood out.
What do you dislike about the product?
The dashboard is powerful but can overwhelm new members.
What problems is the product solving and how is that benefiting you?
We’re finally seeing exposures tied not just to our systems but to suppliers, too. This reduces blind spots and lets us prioritize fixes using AI-driven workflows.


    Sandeep Kumar N.

Actionable Intelligence for Client-Specific Threat Surface Validation.

  • July 31, 2025
  • Review provided by G2

What do you like best about the product?
As consultants, we need high-fidelity insights fast. RiskProfiler’s modular platform lets us spin up client-specific views that identify exposed assets, misconfigurations, and domain hijacks within minutes. The real-time correlation between assets and known attacker infrastructure is especially valuable during breach simulations and red teaming.
What do you dislike about the product?
Export formatting could better support consulting workflows.
What problems is the product solving and how is that benefiting you?
It shortens client onboarding and risk discovery timelines significantly. We’re able to conduct external assessments without relying on incomplete asset inventories. This elevates our threat modelling quality and delivers quantifiable risk metrics upfront.


    Information Technology and Services

From Shadow IT to Strategic Threat Reduction

  • July 31, 2025
  • Review provided by G2

What do you like best about the product?
The platform uncovers shadow cloud services, rogue DNS records, and unmanaged dev apps—then links them to potential breach paths or compliance failures.
What do you dislike about the product?
Would benefit from an executive-level reporting view that simplifies complex tech flows.
What problems is the product solving and how is that benefiting you?
Reduces unmanaged exposure from decentralized teams. We now enforce asset ownership and remediation through linked ticketing workflows


    Rohini S.

Unifying Threat Signals for the SOC and GRC Teams

  • July 31, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler bridges the operational gap between security operations and compliance by aligning indicators (phishing, misconfigs, exploits) with risk controls and policy deviations.
What do you dislike about the product?
The integration options for regional cloud services are really good, but can be improved further.
What problems is the product solving and how is that benefiting you?
Creates a shared threat language across teams. Helps SOC prioritize alerts that impact compliance and risk scoring.


    Information Technology and Services

Proactive Risk Mitigation from Recon to Takedown

  • July 31, 2025
  • Review provided by G2

What do you like best about the product?
Combines domain discovery, attack simulation, phishing kit analysis, and impersonation alerts. Helps us detect attackers at infrastructure setup stage—before emails or payloads are delivered.
What do you dislike about the product?
Timeline visualization across threat stages could be more interactive.
What problems is the product solving and how is that benefiting you?
We’ve moved from reactive detection to proactive disruption of attacker infrastructure, reducing exposure windows across multiple brands.


    Information Technology and Services

Questionnaire Automation Meets Threat Context - kartikey

  • July 31, 2025
  • Review provided by G2

What do you like best about the product?
Enables external detection of exposed APIs, shadow apps, and outdated libraries across dev and staging environments. Includes threat intel overlays so we can triage critical issues faster. We get a unified view of vendor risks, their third-party relationships, and associated attack paths. Even lateral risks from shared hosting or exposed components are surfaced in real time. RiskProfiler connects vendor risk questionnaires with actual threat data. Automated scoring, evidence flagging, and control maturity validation help us eliminate low-value assessments. Monitors misconfigs, orphaned assets, and cloud drift across AWS, Azure, and GCP. Auto-tagging and blast radius scoring streamline issue prioritization in fast-changing environments.
What do you dislike about the product?
Language filtering and version context for third-party components could be more granular. UI search filters across tiers and risk categories can be a bit complex to learn. More visual summaries per vendor would speed up reviews for non-technical stakeholders. Dashboard loading slows with too many filters applied across regions and projects.
What problems is the product solving and how is that benefiting you?
Helps us surface vulnerable and forgotten apps in dev cycles that bypassed SAST/DAST scans. Keeps dev and security aligned. Identifies weaknesses beyond just primary vendors, extending protection to supply chain subnets and inherited risks. This expanded view is critical for resilience. Transforms compliance questionnaires into real security validation. It detects when vendors underreport risks, improving due diligence. Helps us reduce manual cloud audits and enforces policy adherence across decentralized teams. It’s become a key zero-trust enabler.