Average Ratings 0 Ratings
Average Ratings 3 Ratings
Description
Asset Monitor keeps track of all your external facing assets and services. Our protection capabilities and your risk profile will change as your technology footprint changes. Our expert training guides and simulated scams will help you teach your staff cyber security basics so they don't fall for attacks that could expose your company. Dark Web Monitor alerts to data leaks such as credit card numbers, personal information, and credentials. To find out if there are any data breaches, we monitor more than 350 cyber criminal groups. Our dashboard makes it easy to stay on top of cyber security issues. Our Hack Monitor scans the Internet for signs that cyber criminals may be targeting your company, or that you have been hacked but don't know it. Vulnerability Monitor scans your infrastructure for vulnerabilities that hackers could exploit.
Description
Iris provides integration-ready identity and cyber protection solutions that help organizations add powerful customer security capabilities directly into their existing products — without building from scratch. Designed for modern digital platforms, Iris makes it easy to embed identity protection into apps, portals, and customer experiences at scale.
Identity Protection API
Iris’ API suite delivers a multitude of protection solutions—including dark web monitoring & alerts, credit services, risk assessment tools, device protection, and more—into your platform. Teams can fully control the user experience, data flows, and customer journeys while leveraging Iris’ underlying technology and data aggregation.
Micro-Experiences
Prebuilt, customizable UI components that can be embedded directly into your application. These lightweight modules allow teams to quickly deploy identity protection features — such as alerts, dashboards, and monitoring tools — with minimal development effort.
Built for flexibility, Iris supports multiple integration approaches, enrollment methods, and data handling models, so organizations can choose how information flows between users, their systems, and Iris. The platform is designed to scale across large user bases while maintaining strong security and performance standards.
By making identity protection a native part of the user experience, Iris helps organizations increase engagement, strengthen trust, and deliver meaningful, always-on protection to their customers.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$99
Free Trial
Free Version
Pricing Details
$5,000/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
DynaRisk
Founded
2015
Country
United Kingdom
Website
www.dynarisk.com/business/breachdefence
Vendor Details
Company Name
Iris Powered by Generali
Founded
2004
Country
United States
Website
www.irisidentityprotection.com
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Infrastructure Monitoring
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
Security Awareness Training
Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning