The new version of Cyber Smart Active Protect is here
News|by Leanne Bevan|26 June 2024
We are excited to announce that the latest version of Cyber Smart's Active Protect for desktop is now live!
If you're an existing user, you can now upgrade to experience the enhanced features and improvements that Cyber Smart has designed to boost their security and simplify your device management. If you've never used Active Protect before, we can help; as a Cyber Smart partner, we can arrange demos, and provide pricing and additional product information.
What's new in Active Protect
- New Reporting Capabilities: Access a consolidated dashboard that includes all software versions, giving you a comprehensive overview at a glance.
- Legacy Version Management: Transition seamlessly to the latest version with robust support for managing legacy software.
- Renamed Controls: Enjoy enhanced clarity with controls that better reflect the status and state of your devices.
- Enhanced User Experience: Navigate with ease thanks to our updated desktop app, designed with the latest UX principles in mind.
- Light and Dark Modes: Choose between light and dark modes to enhance readability and reduce eye strain.
- Additional Security Control: Prioritise fixes for vulnerable software with added severity indicators.
- Optimised API Call: Benefit from reduced CPU usage when running Security Controls with our new API call.
- Updated Control Logic: Experience fewer false positives and better alignment with the latest Operating System updates.
Experience the improved protection and ease of use that the new Active Protect brings and speak to one of our cyber security experts.
Learn more about Active Protect
If you have any questions or concerns about the new version, please get in touch by filling out the contact form at the bottom of this page.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Leanne Bevan
Related News
Migrating from Bing Maps to Azure Maps: Planning for 2028 and Beyond
Microsoft is retiring Bing Maps. Enterprise support ends by 2028, but your contract might expire sooner. Learn how to migrate to Azure Maps now to avoid disruption and unlock smarter mapping capabilities.
Cyber security in 2025: What you need to know from the NCSC Annual Review
The National Cyber Security Centre (NCSC) has published its 2025 Annual Review – and it’s a wake-up call. From ransomware surges to AI-powered threats, the cyber landscape is shifting fast. Here’s what you need to know to stay ahead. 1....
Understanding the mission critical assets layer of cyber security
Cyber threats don’t knock. They barge in. That’s why forming a multi-layered fortress is important – each layer a wall, gate, or watchtower designed to keep intruders at bay. At the very centre of this fortress lies your mission critical assets...
Control access with the perimeter security layer
In part two of our seven layers of security miniseries, our Cyber Security Specialist Scott Harrison shares tips and insights on how to make your organisation’s digital perimeter safe from threats. It’s all about ensuring only the right people get...