Got questions? This way.

We've put a comprehensive list of frequently asked questions from our customers. If we've not got an answer to your question, just contact us.

Attack Surface Management :

ASM is the continuous monitoring of your organisation’s external-facing assets—such as domains, IPs, cloud services, and shadow IT to identify vulnerabilities before attackers do.

Cyber attackers constantly scan the internet for weaknesses. ASM ensures you stay ahead by detecting exposed assets, misconfigurations, and potential entry points in real time.

We cut through the noise by combining automated scanning with human verification—you only get alerts that matter, not false positives. elementum turpis leo vel libero.

Open ports, outdated software, shadow IT, cloud misconfigurations, exposed services, and signs of dark web exposure and more! Below is a list of what we monitor for.

 

Vulnerable Service (Vulnerable Service)
Report Technical Vulnerability (Report Technical Vulnerability)
Report of botnet activity (Report of botnet activity)
Vulnerable/Weak certificate (Vulnerable/Weak certificate)
Phishing report (Phishing report)
Phishing webpage (Phishing webpage)
Misconfigured Web Server (Misconfigured Web Server)
Mentioned by Threat Actor (Mentioned by Threat Actor)
Leaked sensitive data (Leaked sensitive data)
Impersonating Sub Domain (Impersonating Sub Domain)
Impersonating Domain (Impersonating Domain)
Possible sub domain takeover (Possible sub domain takeover)
Impersonating company profile (Impersonating company profile)
Exposed ports (Exposed ports)
Exposed sensitive documents (Exposed sensitive documents)
Exposed Credentials (Exposed Credentials)
Exposed Access keys (Exposed Access keys)
Association with malware (Association with malware)
Evidence of credential access (Evidence of credential access)
Evidence of Initial Access (Evidence of Initial Access)
Evidence of Reconnaissance (Evidence of Reconnaissance)
 

Not at all. Results are presented in plain language via the ThreatInsights portal, with clear remediation steps for your team. You also get access to an analyst should you need further guidance.

Penetration Testing:

Penetration testing (or “pen testing”) simulates real-world attacks on your systems to find vulnerabilities before criminals exploit them.

At least annually, or whenever you launch a new system, update critical infrastructure, or after significant business changes.

We provide web application testing, infrastructure testing, mobile app testing, cloud testing, and red team-style engagements tailored to your business.

Scanning only reports known weaknesses. Pen testing goes deeper—using attacker tactics to chain issues together and prove real-world impact.

Cras eget leo in quam euismod viverra et luctus tellus. Nullam porta euismod est sodales cursus. In lacinia, mauris quis volutpat tempor, nulla turpis vulputate magna, ut elementum turpis leo vel libero.

You can request a Penetration Test through the ThreatInsights portal.

Incident Readiness:

Incident Readiness ensures your business is prepared to respond quickly and effectively to cyberattacks, reducing downtime and financial loss.

Tabletop exercises, customised playbooks, incident response runbooks, threat assessments, and breach simulations—all accessible through the ThreatInsights portal.

Cyberattacks don’t discriminate by company size. Without a clear response plan, even small incidents can become business-critical crises.

They simulate real attack scenarios in a workshop setting, testing your team’s ability to respond and highlighting any gaps before a real incident occurs.

We don’t just give you generic plans—we create bespoke, business-aligned playbooks tailored to your technology stack and workflows.

Managed Services:

Our managed services cover Penetration Testing, Cyber Threat Intelligence, and Incident Readiness, all delivered through the ThreatInsights portal.

Cyber threats evolve daily. A managed service ensures continuous protection instead of a one-time snapshot of your security posture. We can and do however still cater for those who require one off projects.

Everything is delivered through our secure portal—giving you dashboards, reports, alerts, and direct access to real analysts.

Yes. We’re designed specifically for SMBs and startups that lack dedicated security staff but still need enterprise-grade protection.

Pricing depends on your service level (Base, Pro, Expert). We keep it transparent and affordable for growing businesses—far less than hiring in-house staff. You can see our prices on the pricing page