Defense.com™ logo
  • Switch to UK website
Threat Intelligence Vulnerability Scanning Asset Profile Threat Recon Endpoint Protection Log Monitoring (SIEM) Training and Exams Phishing Simulation
Penetration Testing Cloud Penetration Testing Mobile Penetration Testing Infrastructure Penetration Testing Red Teaming Web App Penetration Testing Managed SOC/SIEM Managed Detection & Response Virtual CISO Outsourced DPO Cyber Essentials
Pricing
Help Center Contact Us Industry Report 2022 Blog Case Study Cyber Security Glossary Press Threat Briefings
Log in
  • Switch to UK website
Defense.com™ logo
  • Platform

    The Defense.com™ Platform

    Learn more about the Defense.com™ platform and how we’re making cybersecurity simple for everyone.

    View Platform Features

    Detection & Response

    • Log Monitoring

      Advanced SIEM technology to analyse logs and raise security alerts.

    • Endpoint Detection and Response (EDR)

      Safeguard endpoints with anti-virus protection and device isolation.

    • Threat Intelligence

      Real-time data feeds to help you stay ahead of the laest threats.

    • Threat Recon

      See your external attack surface through the eyes of a hacker.

    Vulnerability Management

    • Vulnerability Scanning

      Quickly test for known vulnerabilities and security weaknesses.

    • Asset Profile

      Log and monitor all devices across your organization.

    Security Awareness

    • Training and Exams

      Engaging training videos and exams to educate your staff.

    • Phishing Simulator

      Test your staff with targeted phishing email campaigns.

  • Services

    Managed Security Services

    • Managed SIEM

      24/7 threat detection and log monitoring by expert SOC analysts.

    • Managed Detection & Response (MDR)

      Protect your assets and respond to threats across your environment.

    Other Services

    • Penetration Testing

      Evaluate your external-facing systems for security vulnerabilities.

    • Red Teaming

      Identify risks and exploit weaknesses in your physical and cyber defences.

  • Pricing
  • Resources

    Defense.com™ Resources

    Get the most out of Defense.com™ with helpful guides, the latest cybersecurity news and more.

    Support

    • Help Center

      Access helpful guides, FAQs and support articles

    • Contact Us

      Make a general enquiry, live chat, or get support using the platform

    Learn

    • Industry Report 2022

      Find out how threat actors have adapted and how to protect your business

    • Blog

      Keep up to date with the latest cybersecurity news and industry trends

    • Case Study

      Discover how businesses like yours use Defense.com™

    • Cyber Security Glossary

      Definitions for common cyber security and compliance terms.

    News

    • Press

      Get the latest news about Defense.com and media coverage

    • Threat Briefings

      View our monthly videos for updates from the world of cybersecurity.

Press inquiries

Learn more about Defense.com™ and find contact information for our press team.

Two speech bubbles on top of each other

Get in touch

For all press inquiries, please email [email protected]

Recent releases & news coverage

September 14th

Git users exposing sensitive data through hidden folders

Defense.com research found that hundreds of thousands of hidden folders on Git were exposing sensitive credentials and code to bad actors.

February 13th

Russian cyber hackers attacking UK banks - experts issue chilling warning

Britain’s financial institutions are being “severely tested” by Russian cyber hackers, cyber security experts Defense.com™ warned last night.

October 12th

Risky business: UK SMBs would rather risk customer data than slow down growth

Over half (54%) of small and medium sized businesses say their investors only care about growth and not cybersecurity, with 51% preferring to take risks than invest in cybersecurity.

Providing enterprise security since 2014

Trained and certified to industry-leading standards

CREST approved CREST approved CREST approved
Payment card industry data security standard Payment card industry data security standard Payment card industry data security standard
ISO 27001 certified ISO 27001 certified ISO 27001 certified
ISO 9001 certified ISO 9001 certified ISO 9001 certified
Government G-Cloud supplier Government G-Cloud supplier Government G-Cloud supplier
Crown commercial service supplier Crown commercial service supplier Crown commercial service supplier
Cyber Essentials Cyber Essentials Cyber Essentials
Cyber Essentials Plus Cyber Essentials Plus Cyber Essentials Plus
Defense.com™ logo Defense.com™ logo

Features

Threat Intelligence Asset Profile Threat Recon Vulnerability Scanning Endpoint Protection Log Monitoring (SIEM) Training and Exams Phishing Simulation

Services

Managed SIEM Managed Detection & Response Penetration Testing

Resources

Help Center Blog Case Study Threat briefings
Pricing

Solutions

For IT Managers For Business Owners For Risk Management For Small Businesses For Startups For Mid-Market For Enterprise

Company

About Contact Press Partners Terms of Use
Privacy Notice Cookie Policy Status
© 2021-2023 Defense.com™
Defense.com™ Cyber Inc.
Defense.com™ logo

Reduce your cyber risks today with Defense.com™

Try Defense.com™ free for 14 days to see how you can:

  • Get instant threat insights with live data reports
  • Quickly schedule and activate on-demand security checks
  • Easily protect every user, device, and system in your business

Free for up to 5 users. No credit card details required.

“We were immediately impressed with the product set included in the portal. It continues to give us tremendous value and peace of mind by allowing us to fully manage our cyber security.”

Jason T. Bell
Partner & Chief Investment Officer, Capital Planning Advisors

Get your free trial

Complete the form below and our team will be in touch to set up your free trial.

Please provide your full name.
Please provide your company name.
Please provide your business email.
Please provide your telephone number.

By submitting this form, I agree to the Defense.com™ privacy notice.