General questions

Risk Prism is a cyber risk platform offering contextual, business-aligned risk scoring. Unlike others, it integrates multiple tools to give unified, actionable risk insights.

Its objective is to simplify cyber risk analysis. The vision is to bridge cybersecurity with business priorities.

Risk Prism was developed to close the gap between technical vulnerabilities and organizational risk management.

It considers CVSS scores, asset criticality, threat intelligence, and business impact.

Yes, it uses CVSS scores from NIST's vulnerability database.

Yes, risk formulas, weights, and policies are fully customizable.

IT, cloud, mobile, IoT, and OT assets can all be assessed.

Using visual dashboards, summary charts, and risk reports.

Yes – formats include PDF, DOCX, CSV, and JSON.

Yes, it offers built-in compliance templates and mappings.

Yes, through correlation and cross-checking across multiple inputs.

Tiers classify assets (e.g., Tier 1 = Mission Critical) to prioritize mitigation.

By combining threat exposure, vulnerabilities, and business dependency.

Through custom rules and unified risk models that translate diverse scores.

Yes, scores can be overridden with proper authorization.

It supports both cloud and on-premise deployments.

No, it complements them by providing deeper risk analysis.

SIEMs monitor events; Risk Prism calculates and contextualizes cyber risk.

By enforcing encryption, RBAC, logging, and secure APIs.

Yes, dashboards are fully customizable based on user role or needs.

Yes, a comprehensive REST API is available.

Both subscription and enterprise license models are offered.

A Cyber Risk Score reflects potential impact from threats. RMF is a structured framework for managing cybersecurity risk.

Yes, including inventory, classification, and criticality tagging.

By identifying key risk contributors and providing mitigation recommendations.

Yes, it flags legacy systems as potential security risks.

Threat detection

It integrates with Qualys, Nessus, Rapid7, OpenVAS, and others.

Yes, it includes real-time threat feeds.

Data is updated in near real-time or on a set schedule.

Duplicates are automatically identified and merged using CVE IDs.

Based on business impact, sensitivity, and operational role.

Yes, including AWS, Azure, and GCP.

By leveraging threat intel feeds and applying estimated risk logic.

Risk Prism flags such entries and applies a fallback scoring method.

Yes, including tools like Splunk, IBM QRadar, and others.

Yes, it ingests data from EDR, AV, and malware analysis platforms.

Yes, such as NIST, ISO 27001, CIS Controls, and more.

There’s no hard limit; multiple integrations are supported concurrently.

Yes, it supports BIA based on asset context and value.

By helping prioritize vulnerabilities and guiding risk-based remediation.

Security services

Integration is possible via API, CSV import, or third-party tool connectors.

It supports both cloud and on-premise deployments.

SIEMs monitor events; Risk Prism calculates and contextualizes cyber risk.

Yes, including tools like Splunk, IBM QRadar, and others.

Data protection

By enforcing encryption, RBAC, logging, and secure APIs.

Yes, a comprehensive REST API is available.

CIA = Confidentiality, Integrity, Availability – key security metrics for each asset.