Audience

Organizations that want to prevent a data breach incident

About eRiskHub

Let's face it. There's no such thing as perfect security. Whether by hacker, computer glitch or staff mistake, most organizations will experience a data breach incident. In the face of a cyber incident, your clients need urgent help and expertise to respond and recover. Given the complex nature of such events, response is always multi-pronged, requiring expertise in legal/regulatory compliance, information technology (IT) security, privacy, DR/BC, computer forensics, law enforcement, PR, and other areas. When you license the eRiskHub® portal, powered by NetDiligence®, you provide your clients with a go-to resource for all things cyber, helping them shore up their defenses and respond effectively to data breaches, network attacks and other cyber events. We offer several different options to choose from! See our options to the right.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

eRiskHub
Founded: 2001
United States
eriskhub.com

Videos and Screen Captures

eRiskHub Screenshot 1
You Might Also Like
Cloud Native API Management Icon
Cloud Native API Management

For enterprises with large and distributed development teams seeking to rapidly build API-first applications.

Tyk is a leading Open Source API Gateway and Management Platform, featuring an API gateway, analytics, developer portal and dashboard. We power billions of transactions for thousands of innovative organisations.

Product Details

Platforms Supported
SaaS
Training
Documentation
Support
Online

eRiskHub Frequently Asked Questions

Q: What kinds of users and organization types does eRiskHub work with?
Q: What languages does eRiskHub support in their product?
Q: What kind of support options does eRiskHub offer?
Q: What type of training does eRiskHub provide?

eRiskHub Product Features

Incident Response

Workflow Management
Workflow Automation
Incident Database
Incident Alerting
Incident Reporting
Incident Logs
Threat Intelligence
Security Orchestration
Automated Remediation
SLA Tracking / Management
Forensic Data Retention
Privacy Breach Reporting
Compliance Reporting
SIEM Data Ingestion / Correlation
Timeline Analysis
Attack Behavior Analytics