What’s included?

Complete management of your cybersecurity tools, people and processes, plus intelligent monitoring and alerting, presented in a simple, easy to use dashboard.

Active Checks

Security alerts, historical trends and inventory data, for all of your monitored security tools.

Operational Checks

A scheduling, alerting, auditing and reporting tool for GDPR, ISO/IEC 27001:2005 and Cyber Essentials compliance.

Essential Security Tools

Webroot Antivirus is included as standard and ThreatAware Enhanced is bundled with Cisco Umbrella and Automox.

Technical Support

From 9:00am-6:00pm, Monday to Friday, our London support team can assist by phone, email or live chat.

Implementation process

icon-1-x2

Test ThreatAware

We have created a fully functional demo site that you can log into and play around with, so you can better understand what ThreatAware has to offer.

Try ThreatAware
icon-2-x2

Purchase ThreatAware

You can make the purchase online or call the team to discuss which plan is best suited to your business: ThreatAware, ThreatAware Enhanced or ThreatAware Enterprise.

Buy ThreatAware
icon-3-x2

Email confirmation

It takes around 30 minutes for the team to set up your dedicated ThreatAware environment, once complete you will receive an email confirmation.

icon-4-x2

Enter API keys

With the help of our video user guide you will need to gather the API key for each security tool. You can then enter the API keys directly into your ThreatAware environment.

icon-5-x2

Operational Checks Wizard

Next you will need to select which standards and regulations are relevant to your business within the Operational Checks Wizard (takes around 30 minutes). You can also add any custom checks.

icon-6-x2

Start using ThreatAware

Congratulations, you’ve just made the first step towards taking control and effectively managing your cybersecurity.

Supported tools

how-it-works-logo-webroot

Antivirus

Monitors the number of machines protected, blocked infections, infected devices and update status.

how-it-works-logo-cloudflare

Content delivery network

Identifies number of unique hits, blocked threats, and security weaknesses due to configuration vulnerabilities.

how-it-works-logo-cisco-umbrella

Client web proxy

Monitors number of machines protected, malware blocked, Command and Control detected and security weaknesses due to configuration vulnerabilities.

how-it-works-logo-cloudberry

Backups

Highlights number of failed and successful backups and security weaknesses due to configuration vulnerabilities.

how-it-works-logo-cisco-meraki

Firewall

Manages inbound/outbound traffic, number of blocked threats and security weaknesses due to configuration vulnerabilities.

how-it-works-logo-proofpoint

Email filtering

Assesses type of inbound and outbound traffic and security weaknesses due to configuration vulnerabilities.

how-it-works-logo-automox

Patch management

Identifies number of machines protected and out-of-date machines.

how-it-works-office-365

Security

Ensure Office 365 is set up and configured to maximise the great security features available, including 2FA and auditing.

Can't see the tool you're looking for?

We regularly review our list of supported tools, so if you’re using an alternative Cloud based product that we don’t currently support, please give us a call to discuss adding it to the list.

Already got an account?

Log in now to continue where you left off.