Skip to main content

Help us improve the Digital Marketplace - send your feedback

DEFENSE.COM UK LTD

Defense.com

Defense.com is an XDR platform that helps you easily detect and respond to cyber threats.

Defense.com brings security data from any source into a single platform, making it easy for you to identify, prioritise and remediate threats. We combine advanced technologies with expert SOC analysts to provide 24/7 threat detection.

Features

  • Detect and respond to cyber threats from any source
  • Manage threats across your whole business in one place
  • Real-time threat intelligence data feeds
  • See your external attack surface from a hacker's perspective
  • Detect suspicious activity in your network with log monitoring (SIEM)
  • Run vulnerability scans to check for known security weaknesses
  • Safeguard endpoints with anti-virus protection and host isolation
  • Educate your staff with on-demand training videos and exams
  • Test your staff with targeted phishing email campaigns
  • Get step-by-step remediation advice to help fix issues fast

Benefits

  • Detect and respond to cyber threats in one place
  • Simplify security operations and reduce complexity
  • Reduce the risk of cyber attacks
  • Prevent data breaches
  • Collect security telemetry from any source
  • Monitor your entire network for threats and suspicious activity
  • Prioritise threats to your business in order of criticality
  • Stay compliant with ISO 27001 and PCI DSS
  • Educate and test your staff
  • Improve your overall security posture

Pricing

£1.50 a user

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jon.foley@defense.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 8 1 9 8 0 9 3 0 1 7 4 2 2 9

Contact

DEFENSE.COM UK LTD Jon Foley
Telephone: 01438 500 209
Email: jon.foley@defense.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
N/A
System requirements
  • Endpoint agent system requirements:
  • Windows 7 with Service Pack 1, Windows 8.1
  • Windows 10, Windows 11
  • 2GB RAM
  • 2.5GB available HDD space
  • MacOS Yosemite (10.10) or later, 1GB available HDD space
  • Supported browsers:
  • Safari, Mozilla Firefox, Google Chrome

User support

Email or online ticketing support
Email or online ticketing
Support response times
We endeavour to respond to all support enquiries as quickly as possible, and we have dedicated SLAs for responding to security events.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Live chat and file sharing with customer support representatives.
Web chat accessibility testing
We use Intercom who are compliant with the Web Content Accessibility Guidelines 2.0 Level AA.
Onsite support
No
Support levels
We provide 24/7/365 platform support, which consists of customer support specialists, platform engineers and SOC analysts.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Our customer support team helps to onboard each customer remotely. Training is provided both through the Defense.com platform and via the customer success teams as needed. We provide a chat service to help support users as well as online help guides and other documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is exportable via the portal or on request via our customer success team.
End-of-contract process
At the end of the service, any documentation or reports are maintained for up to 12 months before being deleted to allow customers sufficient time to export required data. Data can be stored for longer on request at an additional fee. Customers can also choose a lower package that allows the customer to maintain access to Defense.com and any report data/information supplied.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Defense.com is a web interface, accessible via the internet and provides features and functionality to setup and access to security threats generated form the security tools provided as part of our services.
Accessibility standards
None or don’t know
Description of accessibility
Defense.com is a web interface, accessible via the internet and provides users with the functionality to setup and manage threats from all of the different features provided within the platform.
Accessibility testing
None currently, however our support interface is using Intercom which is WCAG 2.0 level AA compliant.
API
No
Customisation available
Yes
Description of customisation
It is possible to configure different levels of user access within the platform, plus various elements of our Vulnerability Scanning engine, Endpoint Protection agents, Phishing Simulation campaigns and SIEM deployment.

Scaling

Independence of resources
We do not provide a formal guarantee but the service is a SaaS platform based on highly-scalable infrastructure.

Analytics

Service usage metrics
Yes
Metrics types
Service metrics depend on what services are included in the package. We track report delivery SLA, service uptime, data retention, SLA on critical support tickets and security incidents and various feature-specific reports.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported via most features in the platform as a PDF, CSV or via a compressed file.
Data export formats
  • CSV
  • Other
Other data export formats
  • CSV
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • .doc
  • .txt
  • Image files

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Defense.com will monitor all key components used in the delivery of the services 24 hours a day, 7 days a week, 365 days a year. Defense.com will provide technical staff 24x7x365 to support the services provided and to assist customers via chat. Email support will also be provided but should not be used for emergencies.

Credits shall be credited against the next Monthly Recurring Service Fees and shall be paid by Defense.com within 30 days of the customer’s valid demand. Credits apply individually for anyone independent event (or series of related events) and shall not accrue concurrently, sequentially or in aggregate as a consequence of the same event (or series of related events) across all Service levels and the highest credit will apply.

Defense.com liability in each month is limited to 100% of the Monthly Recurring Service Fees for the directly affected services in the month in which the guarantees were not met and subject to any of the exclusions set, including any scheduled maintenance or outages caused by client errors or omissions.
Approach to resilience
This is available on request, we run a highly resilient cloud service.
Outage reporting
A public dashboard and email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Management access is restricted via role based access, two factor authentication and username and password combination.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
27/10/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
One Compliance Cyber Ltd
PCI DSS accreditation date
28/03/2024
What the PCI DSS doesn’t cover
Only our Managed SOC is certified as PCI Compliant.
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO 9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We operate an integrated management system (IMS) combining several management systems, (ISO27001, ISO9001, Cyber Essentials and PCI DSS) in to a single, overall comprehensive, harmonised and fully certified management system. Our IMS combines all aspects of our organisation’s security and quality systems, policies and processes into one smart system. This approach allows our organisation to streamline its management, save time and increase efficiency by addressing all elements of the management system as a whole. Our reporting structure is a tiered system, staring with Information Asset Owners (IAO) who report to departmental Information Risk Owners (IRO). The IRO’s report to the Information Security Officer (ISO) who in turn reports to the Senior Information Risk Owner (SIRO). Our policies are enforced via our Employee Handbook and all staff have a 1-2-1 session with the ISO on joining and must complete mandatory security awareness training. This is repeated on a annual basis. On-going education is communicated as and when required throughout the organisation and working/steering groups are established to ensure effectiveness of the policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes are managed via the organisation's Change/Project Management Policy where a 'Plan, Do, Check, Act' model is adopted and followed. Changes are assessed for their security impact by completing the change management form and once complete, the ISO is engaged to identify potential risks and their impact. The ISO will also identify mitigating controls which may or may not be required to bring any potential risk in line with the organisation's risk tolerance.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Threats to the organisation and services have been assessed and categorised into 'Threat Sources' and 'Threat Actors', where risk assessments are frequently performed against these threats. A Risk Steering Group meets quarterly where threats are monitored. The organisation has established a process to monitor patch releases through Microsoft Intune and ensure automatic patch updates are enabled. AV patching is performed automatically and critical security vendor patches are applied within 30 days. Open and Closed source intel is gathered on a continuous basis, identifying real-time threats. CiSP, NCSC threat briefings are two sources where we gather threat intel from.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a 24/7/365 SOC service delivered via our Defense.com platform. Our team of expert SOC analysts proactively monitor the service for Indicators Of Attack (IOA) and Indicators Of Compromise. We have predefined runbooks which detail how we detect and respond to incidents which the team follow. If we identify a threat our Incident Response team are engaged and the SOC works closely with them to triage and respond to the incident. We have a 30 minute SLA on detection, 3 hour incident response initial response/triage and 24 hour onsite forensic response.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management is managed via our Information Security Incident Management Policy. Our Business Continuity Plan lists a predefined process for common security events. Security events are monitored and raised by our Security Operations Centre (SOC) and managed by the Incident Response Team headed by the Incident Risk Manager (IRM). Users report security events via phone or email to the SOC. Incident reports are by way of an Security Incident Summary Report which is completed by the (IRM), as is the Information Security Incident Process Improvement Plan, where any identified improvements are recorded and managed on the Management Action Plan (MAP).

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

We offer several perks to our staff, one being a wellness programme consisting of mediation, yoga, pilates, workouts, sleep stories and wellness webinars. Another benefit is our comprehensive private medical insurance. Our healthcare covers mental health including counselling, cancer, dental, optical cover, muscular support, and a Digital GP app where GP services are available around the clock. Employees are also entitled to a gym subsidy of 50% towards memberships encouraging fitness. This is promoted with all new starters and shared across the business as part of our quarterly updates and management training. Wellbeing Wednesday is another initiative we recently launched where we arrange company webinars once per month on different wellbeing topics, including; Understanding & avoiding burnout, Nutrition 101, Work-life balance, Emotional intelligence, Building resilience, and Time management. As a business we have adopted a hybrid working model, allowing individuals and teams to work where they feel most comfortable but at the same time encouraging teams to get together in the office for team bonding and social face to face events as we recognise this is important for general mental wellbeing. We operate a cycle to work scheme aimed at giving employees tax savings in purchasing bicycles to travel to work, promoting improving health and fitness, and becoming more energised and motivated. All employees also have access to our EAP service which provides trusted support and advice through 24/7 confidential helpline, critical incident and trauma support, monthly wellbeing newsletters, and four free structured counselling sessions a year, helping our employees to work towards a solution and get back to normality as quickly as possible.

Pricing

Price
£1.50 a user
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
28-day free trial that allows you to identify and manage threats, track assets, monitor your attack surface and train/test your users.
Link to free trial
https://www.defense.com

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jon.foley@defense.com. Tell them what format you need. It will help if you say what assistive technology you use.