ThreatAware’s mission is to empower companies globally to achieve 100% cyber asset protection with ease and efficiency. The company aims to provide complete visibility into an organization’s IT environment, enabling them to discover and protect all cyber assets. ThreatAware’s primary goal is to eliminate security blind spots created by unknown devices and misconfigured security controls. It focuses on ensuring that security tools are not only deployed but are also functioning correctly across every asset.
ThreatAware is recognized as a Cyber Asset Attack Surface Management (CAASM) provider. The company is known for its patent-pending technology that delivers high accuracy in cyber asset discovery. Customer feedback frequently highlights the platform’s user-friendly interface and the ability to centralize and simplify cybersecurity management. The company is trusted by leading organizations across various industries, including finance, retail, and legal.
Offerings, Capabilities, and Integrations
ThreatAware provides a Cyber Asset Attack Surface Management (CAASM) platform designed to offer organizations complete visibility and management of their IT assets and security tools. The company’s platform connects to existing security and IT tools through APIs, aggregating and correlating data to create a single, unified view of a company’s entire IT environment. This agentless approach allows for rapid deployment, providing visibility in under 30 minutes without complex configurations. A key capability is its proprietary, patent-pending timeline-matching technology, which creates unique fingerprints for each device based on behavioral patterns. This technology helps to eliminate duplicate records and uncover “stealth” devices that other tools might miss, revealing on average 30% more devices than were previously known. By unifying the security stack, ThreatAware helps to identify and remediate gaps in security controls, such as missing endpoint detection and response (EDR), multi-factor authentication (MFA), or encryption. The platform automates tasks like remediation, alerts, and reporting, allowing security teams to focus on taking action rather than performing administrative work. ThreatAware integrates with a wide range of security and IT tools, including those from Microsoft, Google, Cisco, CrowdStrike, and Sophos.
Products and Services
ThreatAware’s core offering is its centralized cybersecurity platform, which functions as a Cyber Asset Attack Surface Management (CAASM) solution. The platform is delivered as a service and is designed to provide continuous, real-time visibility and protection of a company’s IT estate. The key components and features of the platform are:
- ThreatAware Connect: This feature focuses on asset discovery. It uses API connections to existing tools and proprietary timeline-matching technology to create a comprehensive and continuously updated inventory of all devices on the corporate network, including those that are traditionally hard to track.
- ThreatAware Discover: This component verifies that security tools are correctly deployed, configured, and functioning across all assets. It performs advanced analysis to identify high-priority vulnerabilities and misconfigurations, helping teams focus their efforts.
- ThreatAware Protect: This feature enables automated remediation of security issues as they are found. It includes an “Action Centre” that integrates with tools like ServiceNow and Jira to fix problems automatically. It also features a “Logic Engine” for risk profiling and a “Device Explorer” for visualizing the IT estate.
The platform as a whole provides a unified dashboard for monitoring, automated reporting for compliance, and advanced search capabilities for deep investigation of security data. The company’s latest version, 3.0, enhanced the platform’s ability to remediate security issues and uncover previously unknown devices.
Target Customers
ThreatAware targets enterprise organizations across a variety of industries, including finance, retail, manufacturing, energy, and legal services. The platform is designed for companies with large and complex IT environments who need to manage a wide array of cyber assets. This includes businesses with tens of thousands of devices, such as desktops, laptops, servers, and virtual machines. Customers often have sprawling networks due to factors like remote work and multiple mergers and acquisitions, which makes maintaining a clear asset inventory and ensuring compliance a significant challenge. The platform is beneficial for IT and security teams, as well as for board members and senior managers who may not have specialized IT skills but need to oversee the company’s cybersecurity posture. By providing a single source of truth for all assets and their security status, ThreatAware helps these organizations gain confidence in their security measures, simplify compliance with regulations like GDPR and ISO 27001, and reduce their overall attack surface.
Cloud Integrations and Marketplaces
ThreatAware provides a range of cloud integrations and maintains a presence on a major cloud marketplace. The platform connects to cloud services via API to gather data for its Cyber Asset Attack Surface Management (CAASM) offering.
- Amazon Web Services (AWS): ThreatAware offers its Cyber Hygiene Platform on the AWS Marketplace. This platform provides visibility into a company’s IT assets and validates security controls. ThreatAware also integrates directly with AWS services, including AWS EC2 and AWS Systems Manager.
- Microsoft Azure: ThreatAware integrates with Microsoft Azure, Azure Active Directory (AD), and Azure Arc to incorporate data from these services.
- Google Cloud: ThreatAware lists integration with Google Cloud Platform. ThreatAware does not have a listing on the Google Cloud Marketplace.
Key People
- Co-Founder / CEO: Jon Abbott
- Co-Founder / Chairman: Steve Thomson
- Chief Technology Officer: Josh Thomson
- Chief Architect: Adrian Cox
- Head of Channel: Richard Mitchell
- Head of Sales: Jamie Stevensen
- Head of Marketing: Emma O’Connor
- Head of Finance: Bhumika Mistry
- Customer Success Manager: Kimberlee Venter
- VP, North American Operations: Mitchell Dollin
- VP, North American Operations: Martin Walker
Key Facts
- Headquarters: London, United Kingdom.
- Number of Employees: 11-50.
- Annual Revenue: Not publicly available.
- Parent Company: None.
- Subsidiary Companies: None.
- Publicly Listed: No.
Analyst Recognition
ThreatAware is recognized within the technology categories of the following analyst groups:
- Gartner includes ThreatAware in its Cyber Asset Attack Surface Management (CAASM) market category. ThreatAware’s platform is also reviewed and rated by users on the Gartner Peer Insights platform.
- Forrester does not include ThreatAware in any of its formal analyst reports or technology category evaluations.
- IDC does not include ThreatAware in any of its formal analyst reports or technology category evaluations.
- Everest Group does not include ThreatAware in any of its formal analyst reports or technology category evaluations.