Threat reports arrive via email or paper without standard intake
Threat Monitor
Turn every threat report into a documented response
Threat Monitor turns every report, interview, and decision into a clear case record so teams respond consistently, comply with policy, and document every step.
- Standardize threat intake with required levels, questions, and fields.
- Assign owners, notify teams, and track follow-through to closure.
- Keep state fields, safety plans, and audit ready reports in one place.
Challenges We Solve & How We Do It
School threat assessment teams need a consistent way to log reports, document decisions, and show follow up. Threat Monitor brings structure and visibility to every case.
Common Challenges
Teams cannot track cases through assessment levels or steps
Interview details and history are scattered across separate notes
Leadership lacks consistent reports for data and outcomes
Tools and forms differ across campuses and years
Our Solutions
Standardized intake forms capture the right details every time
Centralized records track levels, history, and safety plans
Task tracking keeps follow-up actions on time
Time-stamped logs simplify audits and required reporting
Built-in prompts align teams to district guidelines
Key Features That Standardize Threat Assessment
From intake to resolution, Threat Monitor guides each step, coordinates roles, and documents every action so districts respond consistently and stay audit ready.
Structured Intake & Triage
Capture threat reports with required fields, behaviors, and context so intake is consistent. Routing tools help teams review new cases the same day.
Step-Based Assessment Workflow
Guide teams from Transient to Imminent with a step based threat assessment workflow, clear criteria, and role based approvals.
Ownership, Tasks & Notifications
Assign a case owner, tasks, and due dates. Smart reminders keep follow through visible so no follow up is missed.
Evidence, Notes & Attachments
Store statements, interview notes, and documents in one FERPA safe case record. Every edit is time stamped for full traceability.
Resolution & Safety Actions
Document decisions, safety plans, supervision, and re entry steps so you can confirm completion before closing a case.
Reports, Exports & Audit Trail
Generate leadership and compliance reports in one click, with a full audit trail including approvals, timestamps, and outcomes.
How Threat Monitor Streamlines Your Process
From first report to documented resolution, Threat Monitor makes every screening, assessment, and safety plan structured, shared, and accountable.
Start with Clear, Structured Intake
Staff log a concern using guided threat assessment forms. Routing tools help the right assessors review it quickly, often the same day, with full context.
Coordinate Roles and Decisions
Teams move through defined threat levels such as Transient, Substantive, or Imminent while assigning tasks and recording interventions in real time.
Close Every Case with Confidence
Finalize safety actions, parent contacts, and re entry plans. Generate time stamped summaries of every threat assessment for leadership or audits.
Built for Every Member of Your Threat Assessment Team
Clear roles, consistent workflows, and shared visibility so every member acts with confidence and accountability.
Superintendent
View the district threat assessment landscape on one screen, including open cases, levels, timelines, and compliance summaries.
Program Lead
Enforce consistent threat assessment forms and reviews across campuses to support equity, backed by audit ready summaries.
Counselor
Run a structured threat assessment, capture the right details fast, and maintain safety plans and follow ups with full visibility.
Campus Administrator
Manage ownership, timelines, and escalation so interventions land on time and outcomes are verified before closure.
Frequently Asked Questions
Answers to the questions districts ask most about Threat Monitor.
Incident tools log events. Threat Monitor is school threat assessment case management software that manages the full assessment with structured intake, step based decisions (Transient to Imminent), ownership tracking, notifications, and audit ready documentation in one platform.
Yes. Workflows include required fields and prompts aligned with behavioral threat assessment (BTAT) practices. Districts can configure stages, roles, and criteria to match local policy and state guidance.
Records are FERPA safe with role based permissions. Authorized users can share the necessary case details with SROs or law enforcement and every disclosure is time stamped for audit visibility.
It’s launch-ready. After setting district parameters and user roles, campuses can begin same-day intake and assessments with no new hardware or custom coding required.
Yes. iSwiit integrates securely with leading SIS and email systems to reduce double entry and keep stakeholders notified in real time.
Ready to Strengthen Your Threat Assessment Process?
See how Threat Monitor standardizes school threat assessment intake, decisions, and safety plans so your teams respond quickly and document every step.
Schedule a 15 minute demo