ThreatAware is a company whose primary focus is providing a platform which relies on the API feeds from various IT security and infrastructure tools to identify all connected users and devices. It delivers immediate verification that controls are correctly deployed and operating across all cyber assets. Its distinctive agentless approach to Cyber Asset Management permits hourly updates on the cyber hygiene status of each cyber asset.
Do You Manage Peer Insights at ThreatAware?
Access Vendor Portal to update and manage your profile.
The best aspects for me are: Visibility across all devices and integrations. Being able to see installed software on all devices in one place is incredibly useful. The ability to view where devices are on a map. The product is great for maintaining oversight and control.
Freedom of customisation - whether that's already built into the platform or when requested, it is always acknowledged and considered.
Great for spotting users logging on to non-authorised machines. Useful for seeing any devices that have not been setup correctly with the required security agents.
Whilst Threataware has been easy to use, there are a couple of areas that could be improved. One limitation is the lack of a feature that highlights when installed software has reached end of life. Having this visibility built in would make it much easier to identify outdated/unsupported software that could pose a security risk.
Waiting for future developments to be released! Not in a negative way, but rather, each development offers even more on an already modern platform with unique features - simply too enthusiastic to get stuck in!
Reporting is fairly basic, but improving.