Overview
ThreatAware helps organizations maintain robust cyber hygiene with unprecedented visibility into their IT estate. Our Cyber Asset Attack Surface Management (CAASM) platform connects via API to your existing security tools within 30 minutes, creating a single source of truth that reveals the true state of your security controls.
Using our patent-pending timeline matching technology, we identify on average 30% more devices than organizations typically know about, including hidden "stealth" devices that create security blind spots. This comprehensive visibility enables you to maintain proper cyber hygiene by ensuring security tools are not just deployed, but functioning correctly and properly configured across every asset.
ThreatAware's intuitive dashboard highlights critical issues like unprotected devices, endpoint control gaps, non-functioning security controls, and misconfigurations. Our Action Center then streamlines remediation with automated workflows that integrate with your existing tools.
By continuously validating your security posture and enabling efficient remediation, ThreatAware transforms how organizations approach cyber hygiene, reducing risk, streamlining compliance, and giving you confidence that your security investments are working as intended.
For custom pricing, EULA, or a private offer, please contact marketplace@threataware.com .
Highlights
- Complete Asset Discovery: Uncover 20% more devices with proprietary timeline matching, including previously invisible "stealth" devices
- Automated Remediation: Close security gaps through customizable workflows that integrate with your existing tools
- Streamlined compliance and reporting: Reduces your cyber risk through unmatched visibility across every device
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months | Overage cost |
---|---|---|---|
Connect | Comprehensive Asset Visibility. Gain complete visibility of all assets and establish a clear baseline for your security posture.
This price is based on 500 devices. You pay for each device, and the more devices you purchase, the greater the discount you'll receive. | $10,241.00 | |
Discover | Security Control Validation. Validate the health and effectiveness of endpoint security controls across your environment.
This price is based on 500 devices. You pay for each device, and the more devices you purchase, the greater the discount you'll receive. | $17,556.00 | |
Protect | Proactive Defence & Compliance. Drive security excellence through continuous oversight, actionable insights, and automated remediation.
This price is based on 500 devices. You pay for each device, and the more devices you purchase, the greater the discount you'll receive. | $29,260.00 |
Vendor refund policy
All fees are non-refundable and noncancelable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Support Channels:
Email: help@threataware.comÂ
In-platform ticketing system
In-platform live chat
Business hours: Monday - Friday, 9:00 am - 5:30 pm
Phone: +44 (0) 20 3926 6080Email: help@threataware.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.