How RiskIQ Works - RiskIQ

How RiskIQ Works

Get the Ovum Research Report

How Does RiskIQ’s Digital Threat Management
platform work?

Capture

RiskIQ’s advanced internet reconnaissance uniquely combines our global proxy network, web crawlers with virtual user emulation, and collector and sensor technologies to capture massive amounts of detailed public internet data.

Analyze

Once the data is captured, it is normalized and then continuously analyzed using correlation and data science – applying advanced algorithms that leverage big data, customer usage, and attack activity. In addition, RiskIQ research analysts incorporate newly identified exploits and attack vectors to further enhance analytics.

Curate

RiskIQ constantly adds petabytes of normalized data to its Internet Data Intelligence Warehouse, comprised of organized and cross-correlated standard internet data sets and derived data sets. Derived data sets are the result of predictive analytics applied to the standard data to yield derived IP reputation, phishing, zero-day attack, online scam, domain infringement, malware, and other compiled lists.

Manage

The RiskIQ Internet Data Intelligence Warehouse houses petabytes of internet data, derived data, and curated information held in elastic storage to enable analytical breadth and depth. Customers take advantage of platform features such as project management, activity monitoring, and alerting. Interoperability with popular security tools automates diverse investigation and mitigation processes. The system offers end-to-end threat mitigation workflow and proactive blocking.

RiskIQ Digital Threat Management Suite

RiskIQ delivers a SaaS-based digital threat management solution suite. Customers can choose different modules, such as: Digital Footprint to understand their digital attack surface with active change notification; PassiveTotal to investigate threats, pinpoint adversaries and prevent attacks; and External Threats to identify, triage, and take down active digital threats.

See RiskIQ’s Full Product Suite

Get the Datasheet: External Threat Detection: Domain Threats

Get the White Paper: Subdomain Infringement: An Unseen Threat

MOUSE OVER FOR MORE DETAIL

CLICK HERE TO ENLARGE