The Forrester Wave™: Digital Risk Monitoring, Q3 2016 named RiskIQ a leader in Digital Risk Monitoring, and gave RiskIQ top ranking for Current Offering & Data Coverage.
Download the Report
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
RiskIQ Digital Threat Management Platform Datasheet
Learn about our platform and products.
Read the Datasheet
Digital Threat Management – Mitigating External Web, Social and Mobile Threats
Learn more about digital defense and security outside the firewall as explained by Scott Gordon, CISSP.
Watch the Video
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
Understand Digital Threats in Mobile Apps and App Stores
The size, complexity, and dynamic nature of the global app store ecosystem make it increasingly difficult for brands to monitor their mobile presence and protect their customers from fraud. Once published, mobile apps can rapidly proliferate from official stores throughout the app store ecosystem, spreading to new stores and web download locations without the developer’s knowledge or consent.
RiskIQ Mobile Threats enables organizations to monitor and fully manage their mobile presence across the world. Our technology detects unauthorized apps designed to divert users, distribute malware, and steal customer or company data. With a single click, organizations can now remove unauthorized apps from all stores, globally.
Get the datasheet—External Threat Detection: Mobile Threats
RiskIQ Mobile Threats uses virtual user technology to scan and search mobile app stores and download app binary files, looking for official apps, apps that look like official apps, and rogue apps that reference your brand or organization. While most official apps appear in the most popular app stores (Google Play and Apple App Store) there are many other app stores that have been created to provide apps outside of those official ecosystems. These include mobile device manufacturers (like Samsung and Amazon) as well as other, smaller stores. These are often not monitored, and official app binaries (the files that make up the app) are copied and pasted to these other stores.
Because these less known stores are not monitored, official apps can be copied (scraped) and uploaded to these stores. Because of the manual process, apps are often out of date, resulting in potential vulnerabilities to the user’s device. The apps are also not always vetted, so the code may have been compromised to inject malware, spyware, or other malicious software.
The lack of monitoring and visibility into the app stores and app code can lead to customers’ data being compromised and trust and loyalty lost.
Read the research report—Appsession: Is our Appetite for Mobile Apps Putting us at Risk?
Watch the Webinar
Mobile Threats: Is that really your app?
RiskIQ Mobile Threats provides discovery across all major app stores as well as more than 150 less common stores, including focused coverage of high-risk stores and regions for brand impersonation, malware, and fraud. In addition to unparalleled coverage of third-party app stores worldwide, RiskIQ incorporates a unique source of “feral app” binaries, or mobile apps collected outside of dedicated mobile app stores, via drive-by download for example. With this comprehensive mobile presence knowledge organizations have the unparalleled ability to:
Who’s Minding the Store?
Learn more about other digital threats that impact organizations and the rest of the RiskIQ External Threats solution set: