ThreatAware, the pioneering Cyber Asset Attack Surface Management (CAASM) provider, announced the launch of the new version of its cutting-edge platform designed to transform how organisations discover devices and manage their IT assets and security tools.

Version 3.0 now enables the remediation of security issues discovered and uncovers previously unknown devices.

ThreatAware’s platform

ThreatAware’s platform provides a complete view of the IT infrastructure from a single screen

Developed to enable users to protect every cyber asset, ThreatAware’s platform ensures complete accuracy through its patent-pending timeline matching technology. This provides real-time monitoring of every device accessing corporate data to ensure security controls are deployed and functioning. 

With unsecured, unknown devices representing one of the greatest security blind spots, ThreatAware’s platform provides a complete view of the IT infrastructure from a single screen, uncovering hidden risks and previously invisible devices. This enables teams to swiftly identify vulnerabilities and proactively reduce their attack surface.

ThreatAware’s innovative design

Powered by API’s, ThreatAware’s innovative design integrates seamlessly with existing security tools, standardising data from endpoints and ensuring organisations can account for every asset, including those previously unknown or lacking security controls.

With agentless deployment in under 30 minutes, IT and Security teams have instant visibility without the need for complex configuration.

Latest product enhancements

Latest launch features product enhancements to provide even greater power, flexibility, and visibility

The latest launch features product enhancements to provide even greater power, flexibility, and visibility to organisations of assets across increasingly fragmented IT landscapes.

This also ensures teams achieve regulatory compliance through continuous monitoring and detailed cyber risk reports to support more informed decision-making.

Key features of Version 3.0

‘Stealth’ device tracking: the most comprehensive approach to device discovery

ThreatAware’s latest launch provides a new way of analysing previously invisible devices. By creating a timeline fingerprint of activity across every device, the platform can identify if unknown devices are logging on to the corporate network, uncovering the ‘stealth’ devices that may present a security risk.  

ThreatAware’s own analysis of IT environments shows that, on average, 15% of devices have gaps in security controls. Organisations also typically discover an average of 30% more devices accessing corporate data than previously known.

Track Issue Resolution and Remediation

New parts in Version 3.0 will make it even easier for teams to identify and track the key

New features in Version 3.0 will make it even easier for teams to identify and track the resolution of any security issues identified.

The ‘Action Centre’ enables teams to automate and assign actions and provides teams with full visibility of workflows from identification to resolution.

Control, Customisation and Enriched Data

ThreatAware’s proprietary timeline matching technology eliminates duplicate records and provides a real time asset inventory with enriched, contextual data.

Version 3.0 provides even more customisable tagging to deliver a clear, accurate view of the estate and to monitor trends over time, so that teams can make priorities based on their own risk profile.

Fragmented IT landscape

Commenting on the launch, CEO and Co-founder Jon Abbott said: “Finding and managing all assets across a fragmented IT landscape in which cloud computing and remote access expand the attack surface, is a huge challenge for all organisations. It only takes one unprotected device, one misconfigured control, or one forgotten asset to create an entry point for attackers."

"That's why ThreatAware is committed to delivering 100% accuracy and visibility across your IT estate. The power of the platform is not just in the information we track, it’s how we aggregate and analyse this information to highlight risks that simply wouldn’t otherwise be visible."

Latest version of the platform

Abbott continues: “Cyber risk is no longer just an IT concern, it’s a critical business issue. Organisations need to have the right tools not only to prepare for cyber threats but also to withstand and recover from disruption, should an attack strike."

"The latest version of our platform underscores our commitment to supporting organisations with new features and insights which improve efficiencies and workflows and, ultimately, reduce security risks.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...