Privci

Human Vulnerability Scanner

The world’s first behavioural scanning engine — reveals hidden risks before they become breaches.

Privci analyses why people behave the way they do, surfacing trust, fatigue, and shortcuts that quietly influence risky behaviours.

The Hidden Risk

Year after year, human behaviour remains the leading cause of data breaches, despite sustained investment in people, processes, and security programmes.

Organisations continue to be compromised in the same familiar ways.

✗ Social engineering ✗ Credential misuse ✗ Human error ✗ Misconfiguration

The issue is not a lack of awareness, but a failure to understand the underlying conditions — trust, fatigue, and normalised shortcuts — that shape behaviour long before incidents occur.

Archetype Distribution

The Scanner

Privci’s Human Vulnerability Scanner surfaces the behavioural conditions that shape risk across organisations, providing clear visibility into patterns, pressures, and norms that create routes to compromise.

Start your free scan →

Inside the Scanner

Think of a traditional security scanner. It maps your network, identifies unpatched systems, and highlights technical vulnerabilities. Privci’s Human Vulnerability Scanner does the same — but for people. It uncovers the trust, fatigue, pressure, and everyday context that quietly shape how employees make decisions, long before those decisions are exploited.

Dominant behavioural patterns Pressures influencing decisions Norms that form over time ...
Continuous
Feedback Loop
1
Assess
2
Personalise
3
Intervene
4
Reassess

The APIR Framework

We call the engine behind the Scanner APIR—Assess, Personalise, Intervene, and Reassess. It’s a continuous loop that turns human behaviour into something you can actually measure and improve.

During the scan

15
30
90
Events & Use Cases
Challenges
Micro‑lessons
Deviation signals
Phishing sims ...

Assess

The Scanner starts by understanding how your organisation really works, using your internal policies as a baseline. Over a period of 15 to 90 days, it observes day‑to‑day behavioural signals to build a realistic picture of what’s happening across the organisation.

Personalise

Personalise is where those signals are interpreted. The Scanner doesn’t treat everyone the same. Two people might take the same action for very different reasons — one driven by trust, another by time pressure. Without understanding that difference, any response will miss the mark.

Intervene

Intervene is where insight turns into action. Rather than delivering a static report, the Scanner deploys specialised intervention agents that provide the right support to the right people — whether that’s a convenience‑seeker, an anxious avoidant, or a behavioural norm shaping group behaviour.

Reassess

Reassess ensures the Scanner continues to improve over time. The system learns from every interaction — what changed behaviour, what didn’t, and where risk remains — refining its understanding with each cycle and continuously adapting to strengthen insight and effectiveness from one scan to the next.

For Employees

The experience is simple. It runs right in the browser — no software to install and no disruption to daily work. It’s fast to deploy, easy to scale, and non‑intrusive, presenting itself as a personal assistant rather than a security control, offering guidance, reminders, and support in context.

A user with the report stats as an example
Users see a personalised dashboard that helps them understand their own habits, reinforces good decisions, and makes secure behaviour easier rather than burdensome.
Overview of Privci’s browser‑based training agents

Measured Impact

So what do you get from all of this?

The scan provides a clear behavioural map of your organisation. Each employee receives a Vulnerability Profile highlighting strengths, risky habits, the factors influencing behaviour, and the primary behavioural pattern behind those habits.

Human Vulnerability Index Threat Exposure Index Archetype Distribution

Across teams, you gain visibility into dominant archetypes and behaviours that have become normalised — making it clear where attention is needed.

But the real power lies in the routes to compromise — showing exactly how specific behaviours could be exploited by an attacker.

That’s insight you can act on — across the business, not just security.

Compromise Routes

Trusted request received Appears to come from an internal team
Department under pressure Busy environment, urgency to respond
Routine action taken Access granted as part of normal work
Compromise route detected Privci identifies a risky behaviour pattern
Targeted intervention Trust recalibrated, risk reduced

Try the Interactive Demo

Explore Privci in action with interactive demos that offer a practical look at how the Scanner uncovers hidden behavioural risk across organisations.

See how Privci continuously analyses employee behaviour to deliver evidence‑based risk insights and personalised interventions.
Each scan reveals realistic routes to compromise by modelling how behavioural weaknesses and environmental factors could lead to incidents.

Simple, Scalable Pricing

Behaviour‑driven human risk management for every organisation. Start with a free 30-day Human Vulnerability Scan.

Monthly Billing Annual Billing (Save 17%)

Foundation

$5 /user/month

Perfect for small teams beginning their human‑risk journey.

  • Human Vulnerability Scanner
  • Full Awareness Engine
  • Full Phish Aware
  • Change Engine (Behaviour Change, Behaviour Insights)
  • Google Workspace & Azure AD Integration
  • Policy Keeper (always free)
  • Business Watch
Start Free Scan
No credit card. 30‑day full access. Cancel anytime.

Enterprise

Custom Pricing

For large organisations with advanced security, compliance, and integration needs.

  • Everything in Advanced, plus:
  • Unlimited Data Guard real‑time enforcement
  • Custom Geofencing & DLP rules
  • Custom Use Cases
  • Dedicated Customer Success Manager
  • Custom Reporting & SIEM Integration
  • Multi‑department Segmentation
  • On‑premise or Hybrid Deployment
Contact Sales

Privci Engines

Our comprehensive platform combines five specialised engines to address the full spectrum of human risk, creating a continuous layered defence system.

Awareness Engine
Change Engine
Phish Aware
Business Watch
Policy Keeper

Awareness Engine

Multi-layered training experience designed for modern workforces with diverse needs and behavioural patterns.

Instead of relying on one‑size‑fits‑all annual training, Privci provides continuous, contextual, and adaptive learning across three core training streams.

Training Streams:

  • Baseline Training: Continuous foundation with real-time, gamified prompts at policy violation moments
  • CyberSkills Training: Trophy-driven curriculum with compliance-aligned modules and advanced threat-resilience topics
  • Policy Training: Gamified experience centred on the Policy Champion Award, transforming policies into immersive learning

ROI:

Meets mandatory training requirements, reduces repeat violations by 67%, cuts training costs by 45%, and strengthens security culture with measurable behavioural change.

Change Engine

Transforms behavioural data into targeted interventions using the COM‑B model for sustainable change.

While the Awareness Engine delivers training and behavioural data, the Change Engine transforms that data into targeted behavioural interventions addressing root causes of risky habits.

Core Components:

  • Direct Intervention: Ten specialised behavioural agents targeting specific risky habits
  • Security Chronicles: 49-day personalised storyline with real-world behaviours as in-game traits
  • Topic of the Week: Weekly, threat-focused micro-lesson with quizzes and real-world breach references
  • Behaviour Insights: Threat-focused dashboard analysing susceptibility to nine top end-user threats
  • Threat Insights: Visualises potential attack scenarios and likely attacker routes

Phish Aware

Dedicated phishing‑resilience module combining automated simulations with gamified skill‑building.

Phish Aware goes beyond traditional phishing campaigns by combining Phish Tests with the more advanced Phish Challenge, offering a deeper, more accurate assessment of user strengths and weaknesses.

Key Features:

  • Phish Direct: Automated simulations with 800+ templates and custom mode
  • Live Template Suggestions: Sourced from real breach reports and current threat intelligence
  • Supports direct phishing test whitelisting via Microsoft Direct Email Injection, Microsoft SMTP Relay, Google Workspace SMTP Relay, and native integration with Google Workspace and Microsoft Azure AD.
  • Phish Reporting: User‑friendly phishing reports with built‑in education, plus assisted investigation and response for administrators.
  • Phish Challenge: Gamified, inbox-style simulation with Gmail-style and Outlook-style interfaces
  • Leaderboard & Badges: Phish Master, Most Improved, Consistent Performer, Perfect Score
  • Department‑level Comparisons: Highlight team‑based strengths and weaknesses

Business Watch

Digital footprint analysis and real‑time enforcement to prevent data loss and monitor exposure.

Business Watch focuses on each user's digital footprint and online exposure, providing a critical assessment layer that feeds into both Behaviour Change Engine and the Human Vulnerability Scanner.

Core Capabilities:

  • Exposure Scan: Shadow Watch for Shadow IT risks and Breach Watch for monitoring compromised services
  • Data Guard: Real-time enforcement with 35 built-in alert use cases, data geofencing, and browser-based DLP
  • Dark Web Search: Continuous scanning for leaked corporate credentials and exposed emails
  • Monthly "lessons learned" summaries and breach cause insights
  • Domain public data breach monitoring for employee-used websites

Policy Keeper

Transform your internal security policies into actionable guidance and measurable compliance.

Privci's policy-driven design is rooted in a simple principle: help organisations reduce cost, effort, and administrative overhead by making the most of their internal security policies.

Key Features:

  • Policy-Aligned Training: Uses existing cybersecurity policies as foundation for employee training resources
  • 120+ Customisable Templates: For organisations without mature policy libraries
  • Cybersecurity Policy Builder: An advanced policy wizard for creating compliance‑ready security policies with ease.
  • User Acknowledgements: Enables users to review and acknowledge policies, with built‑in tracking and reporting.
  • Centralised Policy Hub: Upload, manage, and distribute security policies
  • Smart Q&A Tool: Built-in assistant for policy questions
  • Audit-Ready Evidence: For SOC 2, ISO 27001, GDPR compliance