• IT Asset Discovery
  • Deep Audit for PC, MAC’s and Linux
  • Monitoring against the 5 Cyber Essentials Technical Controls
  • Identifiction of Key Cloud Services
  • Device Behavioural Monitoring

Compliance Dashboard

  • Alerts via text and email
  • Cloud-based Dashboard
  • Weekly activity summaries
  • Recommended Cyber Security Actions
  • API that allows integration with on-line compliance reporting and querying of vulnerability scans for MSPs

Enhanced Security

  • DNS Firewall that blocks “bad” sites
  • Internal Vulnerability scanning
  • External Vulnerability scanning
  • VPN for mobile workers