External cyber posture
Understand internet-facing risk — then fix what matters first.
Verify assets, run safe posture scans, and move from findings to reports your stakeholders can trust.
Platform preview
A light, floating analytics mock — the signed-in product uses the dark operations console.
Scan usage
Illustrative trend
Findings
- Critical
- High
- Medium
Posture overview
SampleScore
78
Open
24
Assets
6
Illustrative UI only. After sign-in, your workspace shows live scores, findings, and usage for your organisation.
Methodology-led scoring · Tenant-isolated data · Documented deployment · Security overview
What you get
Three pillars that mirror how operators work after onboarding.
Discover your attack surface
Passive inventory and authorised scanning align visibility with domains you verify and control.
Monitor cyber health
External posture scans produce a clear score, weighted categories, and remediation guidance.
Track findings and readiness
Canonical findings feed reports, governance signals, and audit-friendly tenant history.
How it works
Verification to evidence
Step 1
Add and verify domain
Add your domain in Assets and complete ownership verification.
Step 2
Choose security options
After verification, you can pick among CyberHealth security scans and products.
Step 3
Review findings and score
View severity-ranked findings, score band, and recommendations with practical next steps, all in one place.
Step 4
Generate and share reports
Reports are generated after completed scans, using non-technical descriptions and clear evidence.
Why teams stay in the loop
Weak DNS/email controls and exposed services significantly increase risk.
- • Identify and fix highest-severity findings first.
- • Re-run scans to confirm improvements.
- • Generate and share updated reports.
- • Periodically perform scans to discovered hidden exposed assets early.
FAQ
Who is Cyber Health Score for?
Security and risk teams in UK SMEs and mid-market organisations that need evidence-led external posture visibility.
Do you scan without permission?
No. You verify domain ownership before posture scans run. Discovery stays passive and policy-bound.
Where can I read about security and trust?
See our Security and Trust centre pages, plus release notes and status summaries.
Ready to see your workspace?
Start free with your organisation email, or talk to us about Business rollout.