fbpx

24/7 compliance, assurance and threat detection software

How Active Protect works

  • Scan across Desktop, Tablet and Mobile

    Device-specific checks ensure your assets are configured to protect them from common threats. 

  • Scan every 15 minutes or on-demand

    Background scans for vulnerabilities and misconfigurations are performed every 15 minutes or on demand – so you can work safely without interruption. 

  • Step-by-step vulnerability remediation

    For failed checks, we provide simple step-by-step walkthroughs on how to fix them.

  • Risk reporting by user, software and device

    Analyse your entire cyber estate with dedicated reports across devices, vulnerabilities and users

Instant Demo

  • Smart score

    Understand your organisation’s cybersecurity level at a glance and get recommendations on what to do to keep your business safe.

  • Policy creation and management

    Meet your compliance goals and keep employees informed of processes with pre-built templates, a digital policy builder, read receipts and the ability to send policies to specific groups

  • Interactive, multimedia training modules

    Build the human firewall with bite-sized security awareness training to upskill your staff and develop a cyber-safe culture.

  • Training management and reporting

    Set training due dates, enable reminders, and track the level of cyber training across your business through customisable reports.

5,000+ businesses around the world trust CyberSmart to deliver

Complete Cyber Confidence

What our customers say

slider arrow
slider arrow

"After a few hours, I could see how good our cybersecurity was across the whole company..."

...and that we were now ready to apply for our Cyber Essentials certificate and get our free insurance policy. I could now see the status of all our users based on real-time data at any time I wanted. What was particularly impressive about this, is that most of our employees were working remotely due to Covid-19.

Neil S

Chief Technology Officer, MFM IT

"...CyberSmart ensures we're doing what we need to be to protect our customers."

Handy, unobtrusive software that keeps our team safe. Great customer service and a superb product. It's critical for our business (HR software) that everyone on our team follows good security practices, and CyberSmart ensures we're doing what we need to be to protect our customers.

Tom

SME, UK

"Cost-effective protection, continuous threat monitoring, simplified government-standard certifications..."

...no need for in-house experts or tools, quick issue resolution with device visibility

John

SME, UK

"Cracking platform..."

Cracking platform, team and support - thank you.

Luke

SME, UK

Resources

slider arrow
slider arrow

Further strengthen your security with

Cyber Essentials

Upgrade your subscription with Cyber Essentials and get protection from 99.50% of common attacks.

Self-certification is quick and easy, plus you'll get access to unlimited support and attempts at passing Cyber Essentials.

Cyber Essentials Plus

Upgrade your subscription with Cyber Essentials Plus and enjoy the added assurance of external validation for your security configuration.

An accredited auditor will take you through the certification controls and simulate attacks in real-time to test your defences and advise on how to fill any gaps.

Ransomware & Recovery Toolbox

Upgrade your subscription with our Ransomware and Recovery Toolbox, proven to defend your business against the unexpected.

Combined with our free £100k cyber insurance, they guarantee you'll have the right things in place, should the worst happen.

Privacy Toolbox

Upgrade your subscription with our Privacy Toolbox and meet your GDPR requirements. Manage Subject Access Requests in our intuitive workflow, enforce GDPR policies and ensure your business is protected from non-compliance.

Frequently asked questions

  • CyberSmart Active Protect is a powerful on-device agent designed to deliver comprehensive endpoint monitoring, risk management, policy enforcement, and cybersecurity awareness training. With a strong emphasis on security and compliance, it prioritises the protection of your organisation’s sensitive data and ensures you’re meeting regulatory requirements.

  • Active Protect works by running an unobtrusive agent in the background of devices, checking configurations, training modules passed and policies acknowledged. For desktop, the app can be downloaded via email once an administrator has sent out the enrollment link or for mobile, this can be done through the relevant app store. Once a device has been scanned, passes and failures can be reported back to the user and employees responsible for cybersecurity will be able to view this information through several dashboards.

  • No personal or private data is gathered from users, instead, only details about device software, completed training modules, policies completed and hardware are gathered. CyberSmart’s data centres are also UK and EU-based, so your data is not transmitted abroad, and all data is encrypted in transit and at rest.

  • Yes, device and software data is represented in multiple graphs and insights throughout the CyberSmart platform.

  • Active Protect is powered by a small, unobtrusive agent that gathers device data. The agent has been optimised to reduce CPU usage, via our API, and users should not notice any discernible device slowdown when checks are running.

  • CyberSmart checks for vulnerabilities against the US Government’s vulnerability database; one of the most comprehensive databases in the world for software vulnerabilities as well as against 70 Antivirus Databases.

  • Due to limitations imposed by Apple, Active Protect cannot scan iOS devices for vulnerabilities. For Android, software vulnerabilities are scanned and users are notified of any apps deemsd to be suspicious or malicious.

  • Active Protect is a comprehensive cybersecurity solution that protects organisations from cyber threats through compliance, policy management, training and device scanning. The role of an RMM is to give IT teams and managed IT providers remote access to devices to make changes, monitor performance and run tests. Although Active Protect monitors devices for misconfigurations and identifies new software vulnerabilities, organisations will still need an RMM to wipe, lock or make changes to devices remotely.