Cyber Health Score

External posture for security and risk teams.

External cyber posture

Understand internet-facing risk — then fix what matters first.

Verify assets, run safe posture scans, and move from findings to reports your stakeholders can trust.

See product tour · Trust centre

Platform preview

A light, floating analytics mock — the signed-in product uses the dark operations console.

Scan usage

Illustrative trend

Findings

  • Critical
  • High
  • Medium

Posture overview

Sample

Score

78

Open

24

Assets

6

Illustrative UI only. After sign-in, your workspace shows live scores, findings, and usage for your organisation.

Methodology-led scoring · Tenant-isolated data · Documented deployment · Security overview

What you get

Three pillars that mirror how operators work after onboarding.

Discover your attack surface

Passive inventory and authorised scanning align visibility with domains you verify and control.

Monitor cyber health

External posture scans produce a clear score, weighted categories, and remediation guidance.

Track findings and readiness

Canonical findings feed reports, governance signals, and audit-friendly tenant history.

How it works

Verification to evidence

Step 1

Add and verify domain

Add your domain in Assets and complete ownership verification.

Step 2

Choose security options

After verification, you can pick among CyberHealth security scans and products.

Step 3

Review findings and score

View severity-ranked findings, score band, and recommendations with practical next steps, all in one place.

Step 4

Generate and share reports

Reports are generated after completed scans, using non-technical descriptions and clear evidence.

Why teams stay in the loop

Weak DNS/email controls and exposed services significantly increase risk.

  • Identify and fix highest-severity findings first.
  • Re-run scans to confirm improvements.
  • Generate and share updated reports.
  • Periodically perform scans to discovered hidden exposed assets early.

FAQ

Who is Cyber Health Score for?

Security and risk teams in UK SMEs and mid-market organisations that need evidence-led external posture visibility.

Do you scan without permission?

No. You verify domain ownership before posture scans run. Discovery stays passive and policy-bound.

Where can I read about security and trust?

See our Security and Trust centre pages, plus release notes and status summaries.

Ready to see your workspace?

Start free with your organisation email, or talk to us about Business rollout.