- IT Asset Discovery
- Deep Audit for PC, MAC’s and Linux
- Monitoring against the 5 Cyber Essentials Technical Controls
- Identifiction of Key Cloud Services
- Device Behavioural Monitoring
- Alerts via text and email
- Cloud-based Dashboard
- Weekly activity summaries
- Recommended Cyber Security Actions
- API that allows integration with on-line compliance reporting and querying of vulnerability scans for MSPs
- DNS Firewall that blocks “bad” sites
- Internal Vulnerability scanning
- External Vulnerability scanning
- VPN for mobile workers