Our software

Proteus®GRCyber™ helps organisations protect against cyber threats. It prepares you from inside, verifies from outside and discovers attacks. It speaks your language at all levels, from lowly network up to board level, giving you both confidence and risk information aligned to your business objectives.

Proteus®GRCyber™

A cyber risk framework, which empowers CSO’s and CISO’s to protect the board from harmful data breaches that affect reputational damage and share price. Our modular approach allows you to target security issues specific to your business, and achieve the benefits of an integrated solution. You can even incorporate your existing security products.

Addresses

  • Zero day attack on network (incl PoS devices)
  • Fast audit and testing (compliance)
  • 3rd party vendor assessment
  • Staff espionage
  • Intelligence-led risk management alerts
  • Identifying malicious behavior
  • GRC integration
  • Threat intelligence
  • Evidential support for prosecution
  • Identity theft
  • Patch issues
  • Focused security training
  • Staff profiling

Unified Risk Framework
Overlay software that elevates your existing security systems

Audit anything, unify your security systems, report on anything & match risk to business outcomes

ProteusNetwork

Total Business Coverage
Digital Security Risk Management

Harness your existing security infrastructure into a single, integrated, web based, multi-agent cyber protection system.

ProteusNetwork
Implement and test your controls

Compliance & Policy

Clients can choose from many international standard templates or author their own. Audits can be internal or external, ensuring that you, your suppliers and your vendors comply with best international practice.

Risk Assessment

Assessing risk is a key part of any security program. Uniquely, Proteus®GRCyber™ can assess threats by their operational, financial or regulatory impact and assign countermeasures to mitigate these threats. Likewise you can assess Confidentially, Integrity and Availability values.

Business Impact

By modeling your business processes, you understand how they relate to each other and interact with the underlying infrastructure and regulatory controls. With this approach you can better understand the financial, regulatory and operational impact of threats that arise within your business.

Security Awareness Training

Good security can only be achieved by creating a security culture within your staff. According to Gartner 70% of breaches can be traced back to bad practice. Proteus®GRCyber™ integrates online security courses to provide focused security training where and when it’s needed.

Business Continuity

For every business process critical to your business you need an effective continuity plan. Proteus provides a simple process that can assess the effectiveness of your failover plans.

RiskView2™

Visualising how a threat or breach affects the business is key to reacting in a timely fashion and may reduce fines and reputational damage. Riskview2™ allows you to view these relationships clearly and quickly, empowering you to make faster better decisions.

Learn more
  • Proteus®GRCyber™ addresses:
  • Overlooked basic security vulnerabilities
  • 3rd party exposures
  • Insider breaches
  • Poor threat prioritization
  • Planed DDoS attacks
  • Not understanding impact
  • Granting unauthorised network access
  • Poor business decisions
  • Security-unaware staff
  • Espionage
  • Zero day attacks
  • Badly configured networks
  • Inappropriate file transfers
  • Detect rule breaches
  • Encrypted links
  • Out of hours logins
  • Poor password implementation
  • and more
  • Pricing
Look for the unexpected

Staff Profiling

Some staff may not be suited to the positions they hold. Staff profiling helps avoid these pitfalls up front, reducing the likelihood of malicious behaviour.

Intelligence-Led Risk Management

Proteus®Analytics actively searches the Dark Web, Threat Intelligence feeds as well as news and social media to monitor for chatter about impending attacks. ‘Forewarned is forearmed’ allowing you to prepare better for the anticipated attack.

Network Traffic Surveillance System

NTSS collects every IP record your network produces and reconstructs them back into application logic independently of the applications that created them. This traffic can be monitored for unexpected behaviors and network activity (eg unauthorized devices).

Penetration & Vulnerability Testing

Securing the business as best you can on the inside is important, as is rigorously testing this security. Employing the best white hackers and products ensures you’re first to know about a security weakness or vulnerability and can fix it before anyone else finds it.

Log and Patch Management

A large percentage of breaches are due to poor patch management and could have been detected by examining the SIEM logs. Proteus®GRCyber™ collects, searches and alerts on these logs and scopes the impact before the breach occurs.

Incident, Project, Tasks, Email

When an incident occurs, a quick and effective response is essential. With Proteus®GRCyber™ you can quickly track incidents, create projects and teams, allocate tasks and attach critical information (eg. emails and documents) in order to neutralise the threat.

Learn more

Discover great features

Properly implemented, Proteus®GRCyber™ can protect you from 99% of the cyber threats you may face

Proteus®GRCyber™

Perfectly designed

Proteus-Cyber conceived the iGRC concept and secured major UK Government funding to extend their Proteus®GRCyber™ enterprise governance, risk and compliance application into a single, integrated, web based, multi-agent cyber protection system.

CSO's can now secure their assets via this single, real time cyber protection system that takes the best of all the many innovative, cutting edge network agents and sensors, and harnesses them to counter the myriad of opportunities that cyber criminals now have at their disposal.

Proteus-Cyber's products and services can help you:

  • Perform enterprise wide online audits against any international standard and author your own questionnaires for internal and external audit
  • Define a test for every control you implement
  • Use your existing security systems to improve your Situational Awareness
  • Audit your external suppliers against the standards or best practice you expect of your own business
  • Perform focused Security Awareness Training and create a security culture within your business
  • Create extensive security reports for the Board
  • Alert to emerging risks in real time, using dashboards
  • Actively monitor your network for abnormal behaviour by performing “Deep Packet Inspections” and support forensic investigations of malicious activity
  • Perform Network Discovery against your known inventory. Identify and neutralise unmanaged assets
  • Model your Business Processes and quantify their regulatory and financial impact to the business
  • Perform Risk Assessments on all assets and facilities key to your business’s future success
  • Supports real time Business Continuity planning
  • Learn more
dashboard
dashboard
dashboard

Over 40+ international standards
with full authoring capability

ISO 27001:2013, PCI DSS v3, Cobit V5, BS2599, Cyber Essentials, ITIL, ISO 20000, ISO 22301, Data Protection, HIPPA, plus many others

Fast implementation

Proteus®GRCyber™ can be installed in a matter of days. Training is typically 5 days and clients can perform their first compliance audits within weeks.

Dashboard and Reporting

We provide all the reports your auditor would expect as standard. In addition we deliver the Proteus®GRCyber™ report and dashboard designer, which allows clients to create their own reports with an easy to use drag and drop interface.

dashboard

Fully scalable

Proteus®GRCyber™ is enterprise scalable, for example one of our customers implemented over 1,000 sites across 170 countries. Another has 57,000 staff spread across 25 countries.

Security Awareness Training

A recent PWC report states "70% of security breaches can be traced back to staff with a poor understanding of security policies. Proteus' integrated eLearning package can educate your staff with focused security training.

Our Team

With many years of experience in the business, our team knows how to support our customers

Chris Greenslade

Chris is the Sales Director, founding partner and owner of Proteus-Cyber Ltd. Passionate about customer satisfaction, Chris would like to discuss with you how Proteus®GRCyber™ could help your business become secure and more profitable.

John Clelland

John is the Managing Director, founding partner and owner of Proteus-Cyber Ltd. He is an expert in encryption and security systems with over 25 years’ experience architecting specialist IT systems.

Craig Mason

Craig is the Proteus®GRCyber™ software architect, founding partner and owner. His knowledge of cross-platform architectures and large scale web-based applications has particular relevance to the Proteus®GRCyber™ development program he has led.

Our highly experienced management team is keen to understand and meet your requirements

Latest Security News

Here's the latest security news from around the internet

Global survey releases greatest security concerns and risks

According to the 9th annual Global Advanced Threat Landscape Survey conducted by CyberArk, cyber-attacks that exploit privileged and administrative accounts represent the greatest security risks for enterprises. With this capability you can systematically and regularly test each and every control applicable to your business.

Link to article

UK government launches cyber security recruitment process through gaming

The Cyber Security Challenge and the UK government have unveiled a virtual world to ‘nurture cyber skills’ and enable employers to spot cyber security talent.

Link to article

Advanced banking Trojan Shifu begins targeting UK banks and wealth management firms

TA ‘highly sophisticated’ Trojan found to be attacking Japanese firms earlier this month has begun targeting UK banking customers, according to security analysts.

Link to article

Credit agency Standard and Poor could downgrade lenders to standard and poor for cyber-security

According to a new report this week from credit rating agency Standard & Poor, lenders could have their rating lowered if they fail to protect themselves from cyber-attacks or damaging breaches.

Link to article

Only a matter of time before cyber-attack hits broader finance

Ireland's Central Bank's deputy governor, Cyril Roux, has warned that it may only be a matter of time before a cyber-attack builds a problem that descends across the broader financial industry. Roux issued the warning when addressing the Society of Actuaries in Ireland where he stated a cyber-security risk creates a danger across an entire financial system.

Link to article

EU data laws moving to US-style mandatory reporting

EU data regulations are about to change and companies will need to understand what their obligations are when reporting a cyber attack or possibly risk fines or class actions against them.

Link to article

‘Ghost Push’ malware infecting 600,000 Android users per day

According to a new report this week from credit rating agency Standard & Poor, lenders could have their rating lowered if they fail to protect themselves from cyber-attacks or damaging breaches.

Link to article

London launches cyber defence centre for small businesses

London’s deputy mayor for policing and crime Stephen Greenhalgh has launched a public-private partnership initiative to help the city’s small businesses protect themselves from cyber criminals.

Link to article

More and more extra great features

Proteus®GRCyber™ is the most comprehensive integrated Governance, Risk and Compliance product on the market.

Connect to anything

Integrated GRC

Proteus®GRCyber™ allows you to integrate your existing cyber security systems into a single, integrated, web based, multi-agent cyber protection system. With this capability you can systematically and regularly test each and every control applicable to your business.

What you have

Network Discovery

We collect every IP packet your network produces. With this information we can build a network chart of your infrastructure and highlight insecure or unmanaged assets. Additionally, you can use our relationship browser to view the modelling of business processes to assets, controls, documentation and incidents.

Delegation and Workflow

Enterprise Compliance

In the multi-user versions of our product you can link to your active directory and delegate controls around the organisation so that each control is answered by the person responsible for it. This process is more time efficient and accurate in collecting responses, policies and procedures.

Local Standards

Authoring your own standards

You can author your own standards into our compliance engine. These can be bespoke standards or your implementation of an international standard. Furthermore, you can model the relationships between your controls and your ISMS.

Product Versions

All versions of Proteus®GRCyber™ can be hosted in the Cloud or installed on the client's site, as required

  • Security Health Check
  • A hosted version for consultants to perform a 30 day audit and security healthcheck against ISO 27001:2013.
  • ISO 27001:2013
    Single standard
  • Compliance
  • ISMS
  • Limited support
  • X
  • X
  • X
  • X
  • X
  • X
  • X
  • X
  • X
  • X
  • X
  • Enquire
  • Proteus®GRCyber™
  • This is the core enterprise module, providing iGRC functionality plus RiskView2 and Proteus®GRCyber™ Report designer
  • ISO 27001:2013
    plus access to 40+ other standards
  • Compliance and Authoring
  • Standards authoring
  • ISMS
  • Multiuser
  • RiskView2
  • Drag and drop reporting designer
  • Drag and drop dashboard designer
  • Report scheduler
  • Security Awareness Training (e-learning)
  • Support platform
  • X
  • X
  • X
  • X
  • Pricing
  • Proteus®GRCyber™ modules
  • This is the enterprise Proteus®GRCyber™ version with optional additional modules e.g. Deep Packet Inspection and Patch Management
  • ISO 27001:2013
    plus access to 40+ other standards
  • Compliance and authoring
  • Standards authoring
  • ISMS
  • Multiuser
  • RiskView2
  • Drag and drop reporting designer
  • Drag and drop dashboard designer
  • Report scheduler
  • Security Awareness Training (e-learning)
  • Network discovery
  • NTSS, Deep Packet Inspection*
  • Behavioural monitoring
  • Gol, Patch and Log management
  • Support platform
  • Pricing

*NTSS requires hardware sizing based on the clients requirements for retention period and performance

Partners

Please contact one of our country partners to find out more about or to purchase Proteus®GRCyber™

Contact Us

If you would like to know more about Proteus-Cyber and our services please feel free to contact us:

Proteus-Cyber Ltd.
Registered in the UK and Wales 07239733.
VAT registered GB 991 1452 13
20-22 Wenlock Road
London
N1 7GU
United Kingdom
P: +44 (0)208 123 7708
© 2015 Proteus-Cyber Limited
‘Proteus’ is a registered trademark. All rights reserved.

Proteus-Cyber is passionate about helping companies use their existing infrastructure in conjunction with Proteus®GRCyber™ to create a single, integrated, web based, multi-agent cyber protection system to secure their businesses in the current climate of insecurity.

Contact us by email

contact@proteuscyber.com or follow us on social platform

Zoomcharts

© 2015 Proteus-Cyber Ltd.