Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

116 reviews
from

External reviews are not included in the AWS star rating for the product.


    Raj P.

Rapid Reconnaissance for Shadow Asset & Vulnerability Discovery

  • May 02, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler’s phishing detection suite monitored external emails and spoofed domains, flagging impersonation risks early and enabling quick defensive actions to protect brand reputation and customer trust proactively.
What do you dislike about the product?
Some granular location threat classifications required manual adjustments to exclude irrelevant local incidents from physical risk dashboards, ensuring operational intelligence focused only on relevant corporate premises and high-risk geographies.
What problems is the product solving and how is that benefiting you?
Thanks to RiskProfiler, phishing threats became significantly easier to detect and manage, and we quickly responded to brand impersonation attempts before they escalated into serious public-facing incidents.


    Valentina J.

Enhancing Threat Response with Impact-Based Prioritization

  • May 02, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler’s AI-powered vendor risk questionnaire automated our third-party security reviews, saving valuable time and ensuring a standardized and thorough evaluation of vendor security risks, maturity, and compliance obligations.
What do you dislike about the product?
Minor retraining was required during new feature roll outs that enhanced vendor scoring logic, ensuring that security and procurement teams remained aligned on interpreting evolving vendor risk indicators
What problems is the product solving and how is that benefiting you?
Vendor risk assessments became faster and more structured using RiskProfiler’s AI questionnaires, improving supplier due diligence workflows and ensuring consistent standards were applied to all external vendor reviews.


    Sonam A.

Comprehensive External Threat Visibility with RiskProfiler's Robust Risk Management Platform

  • April 30, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler provided contextual threat data around each vulnerability, helping connect raw findings with business risks and internal security policies for faster, more informed decision-making and vulnerability response planning.
What do you dislike about the product?
Adapting third-party risk feeds and business logic filters into the contextual dashboard views required minor customization effort but ultimately enhanced the relevance of incoming alerts to operational teams.
What problems is the product solving and how is that benefiting you?
Our overall experience improved significantly when contextual threat intelligence allowed us to better interpret external findings, aligning vulnerability prioritization efforts with our internal business risk management strategies.


    Prasanna B.

Accelerated Vendor Risk Management with RiskProfiler's Unified External Threat Management Platform

  • April 29, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler’s asset discovery capabilities provided comprehensive visibility across our infrastructure, helping locate shadow IT assets and cloud deployments that might otherwise have remained hidden from security monitoring tools.
What do you dislike about the product?
Managing detailed asset discovery rules required fine-tuning during the early setup phase, which proved to be a challenge initially.
What problems is the product solving and how is that benefiting you?
The asset discovery engine continuously monitored and mapped IPs, domains, and mobile apps, ensuring complete asset visibility even in complex multi-cloud environments that frequently shifted with new deployments.


    Shantanu N.

Prioritized Threat Impact Scoring for Focused Remediation Efforts

  • April 28, 2025
  • Review provided by G2

What do you like best about the product?
Real-time threat detection from RiskProfiler allowed our team to immediately detect and assess suspicious external activities, improving overall readiness against phishing scams, impersonations, and unauthorized external access attempts.
What do you dislike about the product?
Mobile alerting features could be further refined to offer quicker triage capabilities, especially for urgent security incidents requiring instant action while team members are away from workstations or traveling.
What problems is the product solving and how is that benefiting you?
Our experience with RiskProfiler’s real-time threat detection was highly positive. We gained faster insights into external threats and improved our security incident response times across various external-facing digital assets.


    Pooja K.

Unified Threat Monitoring with Real-Time Insights and Seamless Automation

  • April 28, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler delivers comprehensive threat intelligence across External Attack Surface Management (EASM), brand protection, dark web monitoring, and vendor risk assessment. I was particularly impressed by their physical threat monitoring modules, which enable real-time surveillance of business locations directly through the same intuitive dashboard. The platform is extremely user-friendly, offering smooth navigation and easy accessibility. Their support team is responsive, providing thorough and timely assistance. Data visualization is strong, with real-time updates reflected through clear, easy-to-understand graphs and charts. Additionally, the platform's streamlined workflows and automation significantly reduce time and operational effort, offering a truly holistic threat monitoring solution in one centralized interface.
What do you dislike about the product?
While the support team is responsive, the overall response time could be further improved for even better user experience.
What problems is the product solving and how is that benefiting you?
RiskProfiler's vendor intelligence feature uncovered critical gaps in our vendors’ security practices and enabled streamlined collaboration directly through their platform. Their brand intelligence tools proved invaluable in detecting typosquatting and impersonation attempts. Moreover, their takedown management services efficiently handled the removal of fraudulent websites, accounts, and products infringing on our copyrighted assets.


    Kunal L.

Real-Time Risk Mitigation with an Intuitive Dashboard and Strong EASM Capabilities

  • April 28, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler delivers automated remediation workflows that trigger in real time to mitigate emerging risks. Its robust threat intelligence covers external vulnerabilities, data leaks, brand threats, and vendor risks. The platform’s dashboard is intuitive, offering clear, accessible insights, while the support team ensures prompt and comprehensive assistance.
RiskProfiler's EASM solution excels at asset discovery, enabling continuous monitoring of code repositories, backup files, emails, website licensing, typosquats, open ports, unregistered IP addresses, domains, mobile applications, and more. The platform’s multiple dashboard views provide a detailed, segmented understanding of vulnerabilities, enhancing the comprehensiveness of the data.
What do you dislike about the product?
Dashboard complexity can lead to information overload in some cases
What problems is the product solving and how is that benefiting you?
RiskProfiler enabled us to uncover open ports and unpatched dependencies, while its attack path analysis identified vulnerabilities and mapped potential exploitation paths with associated probability scores. It also facilitated the generation of audit reports for a clearer view of our security posture. Additionally, the platform extends to monitoring physical security, offering detailed, location-based insights through dynamic mapping tools.


    Akhilesh P.

Efficient Comprehensive Risk Management for Elevated Security

  • April 28, 2025
  • Review provided by G2

What do you like best about the product?
The platform comes with an intuitive dashboard for tracking specific security risks with easy navigation. The data on EASM, brand risk, supply chain risks, and security gaps can be monitored and analysed with accurate contextual threat data. The dashboard also allowed us to track vendor communication, mitigation progress, and questionnaire status on the dashboard. The risk rating and prioritization make the remediation process more efficient. They also offer multiple integration options for different tools and services used in your business for a comprehensive security setup.
What do you dislike about the product?
We didn’t have any complaints. The lack of a mobile interface, however, limits ease of accessibility.
What problems is the product solving and how is that benefiting you?
Their solution gives a full view of network security gaps and issues, showing asset details, risk ratings, and tracking progress on fixes. It helped us stay updated on vulnerabilities and issues emerging in our systems and vendors', making our security efforts more efficient. It also keeps an eye on all cloud assets, checking their security and scanning for hidden risks across everything linked to them.


    Zaha R.

Easy Setup, and Strong Threat Monitoring Capabilities

  • April 25, 2025
  • Review provided by G2

What do you like best about the product?
RiskProfiler’s threat intelligence is a multi-dimensional and effective security solution. It helped us manage both external and vendor threats with efficiency. Their pricing points are good and suitable for most team needs. The solution can be a good option for brand threat management and supply chain risks. They also offer data points with necessary details, which can be beneficial in informed decision-making regarding the choice of vendor and risk remediation process.
What do you dislike about the product?
I haven’t come across any particular issues.
What problems is the product solving and how is that benefiting you?
Their solutions have helped us track data leaks and compromised credentials on the dark web.


    Aman T.

Proactive External Security Tool for External Threat, Cloud, and Extended Supply Chain Security

  • April 25, 2025
  • Review provided by G2

What do you like best about the product?
The tool helped us discover some critical issues in our external system. The solution offers a clean dashboard, which is easy to navigate, and offers good visibility. The EASM solution is a good tool for discovering problems with APIs, endpoints, DNS security, ports, mobile apps, subdomains, and configurations. They offer a detailed view of all cloud assets, attack paths, and breach details. Their supply chain solution helped us discover some underlying, undetected threats in our vendor’s extended supply chain. The brand intelligence tool detects and takedown typosquat and other fake domains along with phishing campaigns, and targeted attacks effectively. We could successfully discover and dismantle a chain of negative campaigns on social media with the help of their brand intelligence tool
What do you dislike about the product?
Our team hasn’t found any major flaws in their solution so far. However, the dashboard view can be complex and better suited for larger organizations.
What problems is the product solving and how is that benefiting you?
Their solution helped us mitigate critical reputational threats effectively. The tool effectively discovered shadow assets, unpatched ports, and misconfigured APIs. Their compliance tool helped us streamline the regulation adherence process. The security rating dashboard offers individual ratings for different components and present information on the risks are they arise. Their alert system is quite efficient and sends notifications only for the risks that require immediate attention.