Four security audits.
One Windows device. Minutes — not days.
PCRiskPro inspects a single Windows endpoint across data exposure, application vulnerabilities, UK Cyber Essentials controls, and system hardening — then turns the findings into prioritised, plain-English actions you can hand to a user, an IT admin, or a board.
Every scan answers four questions.
Each module produces its own findings, its own prioritised actions, and rolls into a single overall security score weighted by business impact.
Where is sensitive data hiding on this device?
Scans modern and legacy documents, PDFs, images, emails and configuration files for personal, financial, credential, and regulated data — with confidence-scored, UK-tuned detection.
- Modern + legacy Office (.docx, .xlsx, .pptx, .doc, .xls, .ppt, .msg) plus PDF, TXT, CSV, JSON, XML, code files
- OCR for scanned PDFs and images (.png, .jpg, .tif, .webp) with GPU acceleration
- Confidence scoring with entropy + context filters — far fewer false positives than naive regex tools
Which installed apps have known CVEs today?
Enumerates installed applications and matches them against NIST NVD, OSV.dev and the CISA Known Exploited Vulnerabilities catalog — with EPSS exploit-likelihood scoring.
- 20,000+ CVE local database with confidence-aware product matching
- CISA KEV flagging — see which CVEs are being actively exploited in the wild
- Works offline after the first scan; results cached locally for 24 hours
Would this device pass a Cyber Essentials audit today?
Automates the UK Cyber Essentials self-assessment across all five control themes, with pass/fail status and remediation guidance per check.
- Firewalls · Secure Configuration · User Access Control · Malware Protection · Security Update Management
- Plus disk encryption verification (PCRiskPro extended control)
- Audit-ready export with control mapping and evidence
Is Windows hardened against modern attacks?
Eleven configuration checks covering firmware-level protections, credential isolation, ransomware defences, and legacy protocol exposure.
- Secure Boot · TPM · Credential Guard · Controlled Folder Access
- SMBv1 · UAC level · RDP exposure · Guest account · AutoPlay
- Password policy and screen-lock posture
Built for SMEs, IT consultants, and MSPs.
Enterprise-grade detection without enterprise pricing, enterprise complexity, or sending your client data to a third-party cloud.
One scan. Reports for everyone who needs one.
Every scan produces audit-ready exports tailored to different audiences — board, IT, MSP client, or assessor.
- HTML — branded, presentation-ready reports for executives and clients.
- Excel — sortable, filterable workbooks for MSPs tracking multiple devices.
- JSON — full-fidelity machine-readable export for SIEM and automation pipelines.
- CSV — quick extraction for analysts.
See your device's real security posture in minutes.
Free Edition runs the full scan and shows you the first 20 findings per module — no card, no cloud account, no time limit.