background




Cyber Hawk

How it Works





Internal Security Made Easy

The Cyber Hawk process can be broken down into 5 simple steps:

  • Install a single Cyber Hawk appliance on your customer`s network.

  • Configure the appliance by activating a set of Security Policies using the security check list form. The policies turn off/on corresponding alerting. You can also take advantage of built-in service plan templates or create your own for even easier configuration and standardization of service offerings across your customer base.

  • Cyber Hawk will run daily scans automatically and send an alert whenever it detects an unsanctioned change or threat to the network.

  • For certain anomalous activity Cyber Hawk will send an email with your company`s branding to your client asking whether the detected issue needs to be investigated further or can be ignored.

  • You work to resolve issues within our user-friendly portal which exposes the issues along with step-by-step remediation suggestions. Cyber Hawk also has integrations to all major PSA software solutions.