CyberSmart Active Protect

Benefits of CyberSmart Active Protect

  • 24/7 Protection: Guard against cyber threats around the clock.
  • Quick Fixes: Resolve issues with just a few clicks.
  • Complete Visibility: Monitor every device across your business.
  • Universal Support: Compatible with MacOS, iOS, Windows, and Android devices.
  • Remote Work Friendly: Ideal for BYOD policies.
  • Robust Security Checks: Software vetted against 210,000+ common vulnerabilities.
  • Interactive Training: 18 modules complete with factsheets and quizzes.
  • Policy Management: Use templated policies with distribution and read receipts for streamlined compliance.
  • Easy-to-use digital portal

    Our proprietary Essential Eight questionnaire offers easy-to-understand questions, useful in-platform guidance, and unlimited support. Essential Eight assessment couldn’t be easier. 

  • Simplified progression framework

    Our simple, step-by-step progression framework helps you establish what you need to do and when to do it. So you can move through the Essential Eight maturity levels at your own pace. 

  • 365-day compliance 

    Stay safe beyond assessment day, with endpoint monitoring, cyber awareness training and policy management to ensure continuous compliance and year-round protection from Active Protect.

  • Unlimited support

    All the support you need to get started and scale up your security through the Essential Eight maturity levels.

5,000+ businesses around the world trust CyberSmart to deliver

Complete Cyber Confidence

Enquire now

Frequently asked questions

    • Protection from the most common threats
    • Better control over your operations
    • Reduced risk of human error
    • Greater insight into how applications, operating systems and devices are used
    • The ability to bid for government tenders and contracts
    • A competitive advantage over your rivals
    • Prove to partners and customers that you take cybersecurity and data protection seriously
  • The 8 technical controls are:

    • Application whitelisting
    • Patching Applications
    • Patching Operating Systems
    • Configuring Microsoft Office macro settings
    • User application hardening
    • Restricting Administrative Privileges
    • Multi-factor authentication
    • Daily backups
  • Essential Eight has three maturity levels, each one requiring you to implement further cybersecurity controls. Our questionnaire includes the three maturity models as tabs within the platform.

    As you complete each question set, it will turn green, signifying you’re ready to move to the next level. Our progression bar displays all of the questions and includes a handy percentage so you’ll always know how close your business is to full security maturity.

  • CyberSmart Active Protect is a powerful on-device agent that delivers comprehensive endpoint monitoring, risk management, policy enforcement, and cybersecurity awareness training. 

    Active Protect regularly monitors and reports the status of a device by running through a series of security controls, identifying any vulnerabilities in an easy-to-understand traffic light system.

    Active Protect is plug-and-play within your existing IT setup. It provides an intuitive organisation dashboard that can be easily utilised by non-technical personnel throughout your company. This simplicity empowers your non-expert workforce to actively participate in protecting your business.