786 Cyber maps your digital footprint, prioritises vulnerabilities by real-world exploitability, and monitors external threats targeting your organisation — giving you the intelligence to act before attackers do.
Why visibility matters
Shadow IT, forgotten subdomains, misconfigured cloud storage, and unpatched legacy systems are the entry points that attackers find before you do. Technology & Threats gives you the visibility to find them first — and the context to prioritise what matters.
"The organisations that recover fastest from security incidents are never the ones that were most surprised. They're the ones that had the most visibility — of their assets, their vulnerabilities, and the threats targeting them."
What you get
Modules 3, 5, and 6 together give you a unified view of your asset landscape, vulnerability queue, and external threat environment.
Devices, servers, mobile endpoints, IoT, and cloud instances — all catalogued with owner, location, and business criticality rating.
Domains, subdomains, and externally exposed services — continuously monitored for new exposure.
S3 buckets, Azure blob storage, and cloud services scanned for public exposure and misconfiguration.
Cardholder data environment tagged and scoped — essential for PCI-DSS compliance and audit preparation.
Operating systems, applications, and configurations scanned against the NVD and CVE databases — findings explained in plain English.
Security configuration gaps identified against CIS Benchmarks — showing exactly what needs hardening and how.
Vulnerabilities ranked by exploitability, business impact, and live exposure — not just CVSS score. Focus on what actually matters.
Step-by-step guidance for every finding — links to patches, configuration guidance, and verification steps.
Company name, domain, executive names, and brand mentions monitored across dark web forums and marketplaces.
HaveIBeenPwned integration — continuous monitoring for company email addresses appearing in breach databases.
Typosquatting, phishing infrastructure, and brand impersonation domains detected and alerted in real time.
Malware analysis, URL reputation, and external infrastructure exposure monitored continuously.
Vulnerability scanning, patch management, and asset management are explicit requirements in Cyber Essentials, ISO 27001, PCI-DSS, and NIS2. 786 Cyber maps every control — so implementing a vulnerability scan progresses multiple frameworks simultaneously.
Platform features
HaveIBeenPwned integration — free tier available now. Check company domains for exposed credentials in known breach databases.
Real-time malware and URL reputation analysis — available now via the free VirusTotal API tier.
Patching, asset management, and vulnerability controls tagged to CE, ISO 27001, PCI-DSS, and NIST CSF — progress multiple frameworks with every action.
An overall risk score that reflects your technology posture — updated as controls are implemented and threats are detected.
Monthly reports covering vulnerability status, patch coverage, threat alerts, and outstanding technology controls — delivered automatically.
Surface technology risk and threat alerts across every client from one dashboard — coming Phase 3 (Q4 2026) with the full MSP portal.
Framework coverage
Patch management and malware protection are two of the 5 CE control categories. Both require asset visibility.
Annex A.8 (Asset Management) and A.12 (Operations) require documented asset inventory and vulnerability management.
Requirements 6, 11, and 12 require vulnerability scanning, penetration testing, and complete asset inventory for the cardholder data environment.
The Identify and Detect functions are heavily dependent on asset visibility and threat monitoring capabilities.
Start with credential breach monitoring and your asset management controls — available now in the platform.
For MSPs: enquire about the partner programme →