How Does RiskIQ’s Digital Threat Management
platform work?


RiskIQ’s advanced internet reconnaissance uniquely combines our global proxy network, web crawlers with virtual user emulation, and collector and sensor technologies to capture massive amounts of detailed public internet data.


Once the data is captured, it is normalized and then continuously analyzed using correlation and data science – applying advanced algorithms that leverage big data, customer usage, and attack activity. In addition, RiskIQ research analysts incorporate newly identified exploits and attack vectors to further enhance analytics.


RiskIQ constantly adds petabytes of normalized data to its Internet Data Intelligence Warehouse, comprised of organized and cross-correlated standard internet data sets and derived data sets. Derived data sets are the result of predictive analytics applied to the standard data to yield derived IP reputation, phishing, zero-day attack, online scam, domain infringement, malware, and other compiled lists.


The RiskIQ Internet Data Intelligence Warehouse houses petabytes of internet data, derived data, and curated information held in elastic storage to enable analytical breadth and depth. Customers take advantage of platform features such as project management, activity monitoring, and alerting. Interoperability with popular security tools automates diverse investigation and mitigation processes. The system offers end-to-end threat mitigation workflow and proactive blocking.

RiskIQ Digital Threat Management Suite

RiskIQ delivers a SaaS-based digital threat management solution suite. Customers can choose different modules, such as: RiskIQ Digital Footprint™ to understand their digital attack surface with active change notification; RiskIQ PassiveTotal™ to investigate threats, pinpoint adversaries and prevent attacks; and RiskIQ External Threats™ to identify, triage, and take down active digital threats.

See RiskIQ’s Full Product Suite

Get the Datasheet: RiskIQ Digital Threat Management Platform Datasheet