Defense.com™ logo
  • Switch to US website
Threat Intelligence Vulnerability Scanning Asset Profile Threat Recon Endpoint Protection Log Monitoring (SIEM) Training and Exams Phishing Simulation
Penetration Testing Cloud Penetration Testing Mobile Penetration Testing Infrastructure Penetration Testing Red Teaming Web App Penetration Testing Managed SOC/SIEM Managed Detection & Response Virtual CISO Outsourced DPO Cyber Essentials
Pricing
Help Centre Contact Us Industry Report 2022 Blog Case Study Cyber Security Glossary Press Threat Briefings
Log in
  • Switch to US website
Defense.com™ logo
Get a quote
  • Platform

    The Defense.com™ Platform

    Learn more about the Defense.com™ platform and how we’re making cyber security simple for everyone.

    Learn more

    Threat Management

    • Threat Intelligence

      Real-time data feeds from your assets and industry sources

    Attack Surface

    • Vulnerability Scanning

      Quickly test for known vulnerabilities and security weaknesses

    • Asset Profile

      Log and monitor all devices across your organisation

    • Threat Recon

      See your external attack surface through the eyes of a hacker

    Extended Detection & Response (XDR)

    • Endpoint Protection

      Safeguard devices with advanced anti-virus and malware protection

    • Log Monitoring (SIEM)

      Advanced SIEM technology to manage your logs and security alerts

    • Training and Exams

      Fun and engaging training videos, with exams to test your staff

    • Phishing Simulation

      Test your staff with targeted phishing email campaigns

  • Services
    Penetration Testing

    Penetration Testing

    Evaluate your external-facing systems for security vulnerabilities

    • Cloud Penetration Testing

      Detect weaknesses and configuration issues in your cloud environment.

    • Mobile Penetration Testing

      Uncover insecure iOS and Android mobile app functionality.

    • Infrastructure Penetration Testing

      Test your internal and external network infrastructure for weaknesses.

    • Red Teaming

      Identify risks and exploit weaknesses in your physical and cyber defences.

    • Web App Penetration Testing

      Uncover vulnerabilities and insecure functionality in your web app.

    View all Penetration Testing

    Managed Detection & Response

    Detection & Response

    Evaluate your external-facing systems for security vulnerabilities

    • Managed SOC/SIEM

      24/7 managed log monitoring by expert SOC analysts

    • Managed Detection & Response

      Protect your assets and respond to threats with our expert MDR service.

    Managed Detection & Response

    Other Services

    Evaluate your external-facing systems for security vulnerabilities

    • Virtual CISO

      Outsource your CISO duties for cost-effective cyber support

    • Outsourced DPO

      Get expert help with your data protection obligations

    • Cyber Essentials

      Get certified against the UK-government backed scheme

  • Pricing
  • Resources

    Defense.com™ Resources

    Get the most out of Defense.com™ with helpful guides, the latest cyber security news and more.

    Support

    • Help Center

      Access helpful guides, FAQs and support articles

    • Contact Us

      Make a general enquiry, live chat, or get support using the platform

    Learn

    • Industry Report 2022

      Find out how threat actors have adapted and how to protect your business

    • Blog

      Keep up to date with the latest cyber security news and industry trends

    • Case Study

      Discover how businesses like yours use Defense.com™

    • Cyber Security Glossary

      Definitions for common cyber security and compliance terms.

    News

    • Press

      Get the latest news about Defense.com and media coverage

    • Threat Briefings

      View our monthly videos for updates from the world of cyber security.

Press enquiries

Learn more about Defense.com™ and find contact information for our press team.

Two speech bubbles on top of each other

Get in touch

For all press enquiries, please email [email protected]

Recent releases & news coverage

September 14th

Git users exposing sensitive data through hidden folders

Defense.com research found that hundreds of thousands of hidden folders on Git were exposing sensitive credentials and code to bad actors.

February 13th

Russian cyber hackers attacking UK banks - experts issue chilling warning

Britain’s financial institutions are being “severely tested” by Russian cyber hackers, cyber security experts Defense.com™ warned last night.

October 12th

Risky business: UK SMEs would rather risk customer data than slow down growth

Over half (54%) of small and medium sized businesses say their investors only care about growth and not cybersecurity, with 51% preferring to take risks than invest in cybersecurity.

Providing enterprise security since 2014

Trained and certified to industry-leading standards

CREST approved CREST approved CREST approved
Payment card industry data security standard Payment card industry data security standard Payment card industry data security standard
ISO 27001 certified ISO 27001 certified ISO 27001 certified
ISO 9001 certified ISO 9001 certified ISO 9001 certified
Government G-Cloud supplier Government G-Cloud supplier Government G-Cloud supplier
Crown commercial service supplier Crown commercial service supplier Crown commercial service supplier
Cyber Essentials Cyber Essentials Cyber Essentials
Cyber Essentials Plus Cyber Essentials Plus Cyber Essentials Plus
Defense.com™ logo Defense.com™ logo
Features
Threat Intelligence Asset Profile Threat Recon Vulnerability Scanning Endpoint Protection Log Monitoring (SIEM) Training and Exams Phishing Simulation
Services
Penetration Testing Managed SOC/SIEM Managed Detection & Response Virtual CISO Cyber Essentials
Resources
Help Center Blog Case Study Threat briefings
Pricing
Solutions
For IT Managers For Business Owners For Risk Management For Small Businesses For Startups For Mid-Market For Enterprise
Company
About Contact Press Partners Terms of Use
Privacy Notice Cookie Policy Status
© 2023 Defense.com™
Defense.com™ Cyber Ltd
Defense.com™ logo

Reduce your cyber risks today with Defense.com™

Try Defense.com™ free for 14 days to see how you can:

  • Get instant threat insights with live data reports
  • Quickly schedule and activate on-demand security checks
  • Easily protect every user, device, and system in your business

Free for up to 5 users. No credit card details required.

“We were immediately impressed with the product set included in the portal. It continues to give us tremendous value and peace of mind by allowing us to fully manage our cyber security.”

Jason T. Bell
Partner & Chief Investment Officer, Capital Planning Advisors

Get your free trial

Complete the form below and our team will be in touch to set up your free trial.

Please provide your full name.
Please provide your company name.
Please provide your business email.
Please provide your telephone number.

By submitting this form, I agree to the Defense.com™ privacy notice.