Peace on Earth2022-10-27T09:37:25-04:00
CYDEF logo

Peace on Earth

and cybersecurity for all

It’s the most wonderful time of the year…
for cyber criminals

Your team is busy. Stress levels are higher than usual. You have more people working from home than ever before. Everyone is distracted. Maybe you spilled eggnog on your computer. And you’re preparing to close up shop for a few days to give your staff a well-deserved break.

This is a perfect opportunity for cyber criminals to attack your business. They prey on your emotions, stress, busy schedule, and reduced personnel.

It is well-known within the cybersecurity community that attacks rise significantly during the holidays.

And we want to help.

From Nov. 1 to Jan. 3, 2023, we will protect your business for free.

Yes, you read that right.

If your organization has at least 10 laptops or computers to protect, you can install our lightweight cybersecurity agent completely free for the duration of the holidays.

If on January 6, you no longer wish to use our services, no problem. You will have made it through the most dangerous time of year unscathed. You’ll bask in the glow of cyber safety as you read about all the cyber attacks that happened over the holidays. You’ll count all the money you didn’t have to pay in ransomware. You’ll smile and take pride in the very smart decision you made today.

Or you’ll kick yourself because you passed this up.

And that would be a shame.

Protect your business today.

Ready to get started? Fill out the form below and we’ll get you set up.

No upfront payment or credit card information required. You are under no obligation and can cancel any time. For full protection, you must install the software on all Internet-connected computers and laptops in your organization. Please see our Privacy Policy and Terms of Service.

So, what’s the catch?

There isn’t one. Honestly. We genuinely believe everyone should feel safe to do business online. In fact, that’s our official slogan.

If you decide you want to continue protecting your organization from cyber attacks, you will be given the opportunity to continue using the service for a fee. No high-pressure sales tactics.

If you don’t feel your organization needs cybersecurity after the holidays, you can simply uninstall our software.

It’s that easy.

And it gets better: You barely need to lift a finger. Once our agent is installed, the only thing you need to do is respond if you hear from us about an incident.

So fill out the form on this page to get started or review the Frequently Asked Questions below.

What’s included?

For the duration of the holidays, you will get:

What our clients have to say

Jason Dunk
Chief Technology Officer, Saskatoon Public Schools

At MDK Business Law, we work every day with technology and other knowledge-based businesses. As you can imagine, our legal team is privy to very sensitive client information which we access from a variety of locations and devices. Prior to working with the CYDEF team, we lacked visibility into our cybersecurity situation but we knew that we needed to take proactive measures to keep our clients’ data secure. CYDEF provides us with peace of mind through the use of SMART-Monitor on all of our workstations. We’re experts in the law, not cybersecurity, so we are very pleased that CYDEF provides us with a first-class solution that secures our confidential information from malicious attacks.

Naomi Morisawa De Koven
Managing Lawyer

Frequently Asked Questions

How scalable is CYDEF’s solution?2023-08-31T18:22:30-04:00

As we onboard more endpoints, our solution grows exponentially more efficient. Over the course of six months, we worked with Canada’s Centre of Excellence in Next Generation Networks (CENGN) to prove that our architecture scales successfully beyond 100,000 devices. With this knowledge, we have developed a clear path to scale into the millions of devices.

What is the frequency of data transfer?2022-05-27T13:02:39-04:00

It is a continuous process. The solution is intelligent enough to know if the connection is broken and identify the last timepoint of data transfer. When the connection is re-established, it will know when the last transmission occurred and will provide all the data from that point onwards.

What data is transmitted to outside from the client’s system?2022-05-27T13:02:34-04:00

Activity data is securely transmitted to CYDEF servers. Personal client data is not collected, collection activity is restricted to event log files and meta data (e.g. file name, command line, event id). All collected data is encrypted in transit (TLS1.2) and at rest (AES-256 with key rotation).

How is CYDEF different?2023-08-31T18:02:03-04:00

Traditional cybersecurity solutions rely on automation to score threats based on estimated risk. However, only the threats with the highest scores are investigated by analysts due to overwhelming amounts of data and lack of resources. This leaves customers vulnerable to more sophisticated attacks, which are specifically engineered to bypass automated security tools.

At CYDEF, we don’t score threats at all. Instead, we start by classifying and filtering out what’s ‘normal’ in a business environment. Once those activities are set aside, everything that’s left over is a potential threat and gets investigated.

Our Machine Learning technology serves to make our work exponentially more efficient, empowering our analysts to make the important decisions on what is a threat and what is not. This ensures there is no guessing and no gaps.

100% of unknowns are systematically reviewed by humans — a feat that was previously unheard of.

This is why we detect threats our competitors can’t.

The result is a simple, affordable, and more effective solution. And it’s managed for you.

Why do I need CYDEF if I have a firewall and anti-virus?2023-08-31T18:24:38-04:00

Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through.

Sadly, every business is at risk. Cyber criminals use your devices to conduct illegal activity, hold your data hostage, and spread their malware to others (including your clients). The SolarWinds Supply Chain attack of 2020 is a perfect example. Criminals used SolarWinds to infect thousands of other organizations.

And they aren’t only targeting large enterprises. If you have computers connected to the Internet and data that is valuable to you, your staff, or your clients — you’re at risk.

It’s no longer a matter of if a business will be breached, it’s when.

We get it. That sounds like fear mongering.

But sadly, it’s true. In fact, cyber insurance companies no longer offer $10 million policies for that very reason. And even the insurance companies themselves are not immune.

So don’t wait until it’s too late. Contact us today to protect your business with a simple, effective solution that won’t break the bank.

I’ve already been attacked, what are the odds it will happen again?2022-10-24T14:15:42-04:00

Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals know that most people make this assumption and don’t make any changes to their cybersecurity profile. So they give your business just enough time to recover before they come after you again.

What do I need to sign up?2022-05-27T13:02:51-04:00

The only thing you need is a business email address. You don’t need a credit card and you won’t be asked to sign a contract. Simply fill out the form with your business email and we’ll send you what you need.

What type of malware does CYDEF detect?2023-08-31T17:40:04-04:00

Due to our unique method of investigating 100% of unknowns, we can detect malware that evades firewalls, anti-virus, and automated security tools. This includes known and unknown threats, such as:

  • Ransomware precursors

  • Corporate espionage

  • Insider threats

  • Potentially Unwanted Programs (PUPs)

  • Novel threats that have not been added to anti-virus signature lists

  • Zero-day attacks

  • Pirated media

  • Phishing

  • Crypto mining

  • Attacks leveraging native system utilities (via Living Off the Land Attacks)

  • Attacks exploiting trusted programs (e.g., Microsoft Word)

  • Integrated threat intelligence to easily identify attack markers

  • Risky employee behavior (e.g., downloading cracked software, plaintext password files, etc.)

What happens after I sign up?2023-08-31T18:10:41-04:00

You’ll receive an email from our team with a link to download our light-weight SMART-Monitor agent and a key that is unique to your organization.

You’ll need to install the agent on every laptop, desktop, and server in your organization. If you only install it on a few devices, you won’t be fully protected… That’s like locking your front door, but leaving all the windows wide open. We can’t keep your business safe that way.

Once you start installing, we’ll confirm your endpoints are sending telemetry as expected and you’ll be granted access to our SMART-Monitor and support portals.

SMART-Monitor Dashboard
(click to enlarge)

How many devices can I protect?2023-08-31T18:13:22-04:00

There is no minimum. You can install our agent on as many endpoints (desktops, laptops, and servers) as you have, even during a trial.

Twenty? No problem. Twenty thousand? Fine by us.

What if I already have a cybersecurity solution in place?2023-08-31T18:04:33-04:00

Our SMART-Monitor agent is compatible with most other cybersecurity solutions, so it shouldn’t be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.

Where can I find pricing?2023-08-31T18:16:05-04:00

We would be happy to send you pricing information. Our pricing model is very simple — it’s based on the number of endpoints (desktops, laptops, and servers). Please contact us to learn more.

What is the frequency of reports?2023-08-31T18:25:47-04:00

Customer portal access is provided so reports can be accessed in real time 24/7.

What level of Security Operations Center (SOC) compliance does your SOC maintain?2023-09-01T08:48:59-04:00

We have a SOC 2 Type 2 attestation.

How much bandwidth is required?2023-08-31T18:25:42-04:00

All data processing is done in the cloud, so the impact on your system is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.

What are the minimum technical requirements?2023-07-24T08:31:15-04:00

Minimum technical requirements

  • System resources: 2GB RAM, 1GB in disk space
  • Internet access with ports 443, 5671, and 5672 open for outbound communications between the agent and the Internet*
  • Bandwidth: approx. 3 GB/mo/device (varies)


The CYDEF Agent is compatible with all currently supported versions of Windows, found here:

For existing customers with Windows or Windows Server versions that have passed end of support or end of extended support: We will continue to provide service with the installed version of the agent, but no updates to the agent or SYSMON will be provided. Customers assume all risks for known and unknown vulnerabilities discovered in these older products.


  • macOS: Catalina 10.15+


Linux Servers operate on  many different variants and distributions. As a general rule, CYDEF aims to offer support whenever possible, especially for modern builds. For the best results, please provide your list of in use versions to the CYDEF customer success team and they will be happy to reply back with the support status.

We currently support distributions built with Ubuntu v18 or higher, Red Hat RHEL 7 or higher, Kali 2022, Majaro 19 or higher and any distribution such as Arch Linux built with the Linux Kernel 5 or higher.

There may be cases where a specific installation on Linux will require some technical assistance from CYDEF in order to succeed. CYDEF is happy to provide this assistance free of charge for any of the above supported platforms.

Last updated: July 6, 2023

An award-winning partner you can trust

Sign up today and sleep well through the holidays!

© Cyber Defence QCD Corporation (CYDEF). All Rights Reserved.

Go to Top