Solutions for all organisations

Overview of Plans

No matter how advanced your cyber asset management programme is, ThreatAware has a version to suit your needs. Get in touch with our team to discuss which product would be most suitable for your organisation.

Connect

Ditch your spreadsheets and enter the world of Cyber Asset Management.

  • Unlimited Integrations
  • Cloud Hosted
  • Agentless
  • Updated Continuously
  • See Missing Agents

Discover

Confirm if your security controls are deployed and functioning.

  • Customisable Columns
  • See Inactive Agents
  • Dynamic Tagging
  • Endpoint Lens
  • API Connectivity

Protect

Most popular

Fully protect your devices, ensuring that your security controls are deployed, functioning and healthy.

  • Alert Configuration
  • Workflow Automation
  • PDF Reporting
  • Agent Configuration
  • Agent Health

Protect+

Complete the circle by aligning your users, devices and their controls into one central console.

  • User Connections
  • Detail User View
  • MFA Reporting
  • Software Inventory

Feature comparison

Connect

Ditch your spreadsheets and enter the world of Cyber Asset Management.

Connections

Supported Integrations
Yes
Cloud Hosted
Yes
Agentless
Yes
On Prem Connectors
Yes
Continuous Monitoring
Updated hourly

Device Security

Active Device Inventory
Yes
Inactive Device Inventory
Yes
Detailed Device View
No
Device Hardware Information
No
Geo-location data
No
Alert Configuration
No
Software Inventory
No
Device Tagging
Static

Reporting

Filter
Yes
Export CSV, Excel, JSON
Yes
Saved Views
No
Customisable Columns
No
Custom Queries
No
AI Queries
No
Scheduled Email Reports
No
Customisable Dashboards
No

Security Controls

Deployment
Yes
Function
No
Health
No
Configuration
No

Workflow Automation

Task Assignment
No
Email Alerts
No
Webhooks
No
Automatic Ticket Creation
No

User Security

User Inventory
No
Detailed User View
No
Active User to Device Pairing
No
User Tagging
No

Miscellaneous

Exceptional Customer Support
Yes
User Logins
Unlimited
Integrate Remote Connection
Yes
Endpoint Lens (Browser Plugin)
No
API Access
No

Discover

Confirm if your security controls are deployed and functioning.

Connections

Supported Integrations
Yes
Cloud Hosted
Yes
Agentless
Yes
On Prem Connectors
Yes
Continuous Monitoring
Updated hourly

Device Security

Active Device Inventory
Yes
Inactive Device Inventory
Yes
Detailed Device View
Yes
Device Hardware Information
Yes
Geo-location data
Yes
Alert Configuration
No
Software Inventory
No
Device Tagging
Static + Dynamic

Reporting

Filter
Yes
Export CSV, Excel, JSON
Yes
Saved Views
Yes
Customisable Columns
Yes
Custom Queries
Yes
AI Queries
Yes
Scheduled Email Reports
Yes
Customisable Dashboards
No

Security Controls

Deployment
Yes
Function
Yes
Health
No
Configuration
No

Workflow Automation

Task Assignment
No
Email Alerts
No
Webhooks
No
Automatic Ticket Creation
No

User Security

User Inventory
No
Detailed User View
No
Active User to Device Pairing
No
User Tagging
No

Miscellaneous

Exceptional Customer Support
Yes
User Logins
Unlimited
Integrate Remote Connection
Yes
Endpoint Lens (Browser Plugin)
Yes
API Access
Yes

Protect

Fully protect your devices, ensuring that your security controls are deployed, functioning and healthy.

Connections

Supported Integrations
Yes
Cloud Hosted
Yes
Agentless
Yes
On Prem Connectors
Yes
Continuous Monitoring
Updated hourly

Device Security

Active Device Inventory
Yes
Inactive Device Inventory
Yes
Detailed Device View
Yes
Device Hardware Information
Yes
Geo-location data
Yes
Alert Configuration
Yes
Software Inventory
No
Device Tagging
Static + Dynamic

Reporting

Filter
Yes
Export CSV, Excel, JSON
Yes
Saved Views
Yes
Customisable Columns
Yes
Custom Queries
Yes
AI Queries
Yes
Scheduled Email Reports
Yes
Customisable Dashboards
Yes

Security Controls

Deployment
Yes
Function
Yes
Health
Yes
Configuration
Yes

Workflow Automation

Task Assignment
Yes
Email Alerts
Yes
Webhooks
Yes
Automatic Ticket Creation
Yes

User Security

User Inventory
No
Detailed User View
No
Active User to Device Pairing
No
User Tagging
No

Miscellaneous

Exceptional Customer Support
Yes
User Logins
Unlimited
Integrate Remote Connection
Yes
Endpoint Lens (Browser Plugin)
Yes
API Access
Yes

Protect+

Complete the circle by aligning your users, devices and their controls into one central console.

Connections

Supported Integrations
Yes
Cloud Hosted
Yes
Agentless
Yes
On Prem Connectors
Yes
Continuous Monitoring
Updated hourly

Device Security

Active Device Inventory
Yes
Inactive Device Inventory
Yes
Detailed Device View
Yes
Device Hardware Information
Yes
Geo-location data
Yes
Alert Configuration
Yes
Software Inventory
Yes
Device Tagging
Static + Dynamic

Reporting

Filter
Yes
Export CSV, Excel, JSON
Yes
Saved Views
Yes
Customisable Columns
Yes
Custom Queries
Yes
AI Queries
Yes
Scheduled Email Reports
Yes
Customisable Dashboards
Yes

Security Controls

Deployment
Yes
Function
Yes
Health
Yes
Configuration
Yes

Workflow Automation

Task Assignment
Yes
Email Alerts
Yes
Webhooks
Yes
Automatic Ticket Creation
Yes

User Security

User Inventory
Yes
Detailed User View
Yes
Active User to Device Pairing
Yes
User Tagging
Static + Dynamic

Miscellaneous

Exceptional Customer Support
Yes
User Logins
Unlimited
Integrate Remote Connection
Yes
Endpoint Lens (Browser Plugin)
Yes
API Access
Yes