![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Up to 100 users
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Secure platform that is ISO 27001 Certified
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Use of a secure platform that is Independently Technical Penetration Tested
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Single Sign On (use your companies Microsoft of Google Credentials)
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Easily Manage Users, Assessment Contributor and Report Viewer Access
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
2 hour professional advisor session from senior expert to help team get started.
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Health Check
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
SMB 1001
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
ISO 27001
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Essential Eight
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
NIST Cyber Security Framework
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
SOC 2
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Access to all new standards and frameworks
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Create unique company profiles for your clients
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Create accounts for Supplier assessments
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Easy Access To Helpful Guidance
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
30+ Cyber Security Policies and Governance Tools
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Give Others Secure Access to a Specific Assessment
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Tag Your Notes as Your Go to Track Important Information
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Instant Suggested Actions Aligned to Real Risks
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Customisable Action Plans
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Add and Categorise Supporting Evidence
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Access a range of professional tools and templates to help clients uplift their security controls quickly.
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Create a Report within Seconds using Professional Report Templates
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Instant Risk Register
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Keep a Track of Historical Reports
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Instant Security Capability Reports
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Maturity Graphs by Standards
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Compare Maturity of Controls Over Time
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Customise You Own Report Templates to Ensure Consistency
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Custom Risk Assessment Module
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Align control and risk assessments to each client's needs.
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Customisable risk matrix to ensure business aligned outcomes
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Set Worst Case Scenario Ratings to Drive Unique Business Outcomes
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Conduct a Risk Assessment Overlay With Advanced Features such as Deciding Treatment Plans and Adjusting Target Risk
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Track important information about business assets
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Quick asset set-up by selecting commonly used pre-defined assets.
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Easily tag assets into easy-to-understand groupings.
![](https://cdn.prod.website-files.com/65290775914c23d3cd34d22e/65c19b7ddd3a89bb25a4ed53_Asset%202.png)
Import and export asset lists.