Service Providers2022-09-13T14:47:21-04:00

We make your job easier.

And we catch threats others can’t.

Why choose CYDEF?

We make it easy for you to protect your clients while drastically increasing your operational efficiency. Our state-of-the-art, zero-trust solution is transparent and verifiable, allowing you to see exactly what’s happening and if we’ve done what we say we’ve done.

We’ll protect your clients from threats such as PUPs, policy violations, living off the land attacks, crypto mining, espionage, and of course, ransomware.

Brandon Meszaros, OCX CEO, Digital Solutions Group, talks about his experience with CYDEF.

Partner with CYDEF for:

SMART-Monitor Portal view
(click to enlarge)

  • Managed service: We take care of everything, so you don’t have to lift a finger
  • Efficiency: Low to zero false positives saves you time and increases your operational efficiency
  • Visibility: Clear information and transparency about all incidents and endpoint activity
  • Adaptability: Easily adapts to network/site changes to avoid additional costs for expansion and wasted resources with consolidations
  • Cloud-native technology: Our solution is easy to deploy, easy to scale, uses little bandwidth, and doesn’t require additional hardware
  • Scalability: Regardless of the size of clients you serve, you’ll be able to offer them our solution

Our competitive stance

Many cybersecurity providers treat events that aren’t malicious as unimportant information.

At CYDEF, we treat any unwanted activity as relevant – not just the activities that will inflict the most damage. From malware to adware to unwanted programs, our solution analyzes all types of threats.

We cross-reference all endpoint activity against our list of known, safe activities, and known malicious activity. Then, our team of cybersecurity experts reviews the remaining activities and classifies them as either safe or malicious. This unique approach, based on the zero-trust model, means that, as we classify more and more activities, the efficiency of our system grows even stronger.

With every device we protect, our system gets exponentially more efficient.

CYDEF’s MDR service offers:

  • Detection and response: We identify threats as activity occurs on your client’s endpoints, making for quick and efficient isolation and remediation

  • Expert analysis and support: Our team reviews, investigates, and classifies all unknown activity. We respond to malicious activities

  • Protection from Day 1: Our solution detects threats as soon as it’s installed, and no additional hardware is required

  • Compatibility: Works with your client’s existing technology stack, including other cybersecurity products

Fostering a proactive approach

Enhance your clients’ cybersecurity stance with clear knowledge of what happens on their endpoints – and why. Activity recorded in CYDEF’s SaaS portal enables continuous improvement planning and a simplified approach to security.

  • Too many erroneous links clicked? Cybersecurity awareness training may be required.
  • Too many potentially unwanted programs detected? User permissions may need revision.

CYDEF builds solutions to enhance our service providers’ cybersecurity stack. Our technology is simple to install and seamlessly detects, analyzes, and enables swift response against security threats.

Want to know more? Let’s connect and discuss how we can help.

Connect with us

We trust CYDEF because we trust the people at CYDEF. From the Chairman and CEO to the COO and all the scientific and analytical staff, we have benefited enormously from knowing and working with them. All our interactions with CYDEF have been characterized by competence, empathy, and outstanding integrity. The people at CYDEF are why we inherently trust CYDEF as a corporation and partner.

Bernard Gibbs
President & General Manager

Frequently Asked Questions

How is CYDEF different?2022-05-27T13:02:46-04:00

What really sets us apart is our approach to identifying attacks. Our competitors look exclusively for threats based on known patterns, much the same as anti-malware solutions do.

Our technology analyzes the activities on your endpoints and validates if it is what we would expect to see in a normal business environment. If not, our security team investigates.

This combination of machine learning and human intervention results in near zero false positives.

What is the frequency of reports?2022-05-27T13:02:44-04:00

Customer portal access is provided so reports can be accessed in real time 24/7.

What is the scalability of the solution?2022-05-27T13:02:41-04:00

Over the course of six months, we worked with Canada’s Centre of Excellence in Next Generation Networks (CENGN) to prove that our architecture scales successfully beyond 100,000 devices. With this knowledge, we have developed a clear path to scale into the millions of devices.

What is the frequency of data transfer?2022-05-27T13:02:39-04:00

It is a continuous process. The solution is intelligent enough to know if the connection is broken and identify the last timepoint of data transfer. When the connection is re-established, it will know when the last transmission occurred and will provide all the data from that point onwards.

How much bandwidth is required?2022-05-27T13:02:36-04:00

All data processing is done in the cloud, so the impact is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.

What data is transmitted to outside from the client’s system?2022-05-27T13:02:34-04:00

Activity data is securely transmitted to CYDEF servers. Personal client data is not collected, collection activity is restricted to event log files and meta data (e.g. file name, command line, event id). All collected data is encrypted in transit (TLS1.2) and at rest (AES-256 with key rotation).

What type of malware does CYDEF detect?2022-05-27T13:02:31-04:00

Our solution can detect malware that evades firewalls and anti-virus, such as policy violations, misconfigurations, phishing, zero-day exploits, crypto mining, living off the land attacks, potentially unwanted programs (PUPs), espionage, and of course, ransomware.

What are the minimum technical requirements?2022-05-27T13:05:42-04:00

Minimum technical requirements:

  • System resources: 2GB RAM, 1GB in disk space
  • Internet access with ports 443, 5671 and 5672 open between the agent and the Internet*
  • Bandwidth: approx. 3 GB/mo/device (varies)


  • Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2
  • .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) v5.1, TLS v1.2
  • * Windows 7 requires port 1883 to Microsoft


  • macOS: Catalina 10.15+


Linux Servers operate on  many different variants and distributions. As a general rule, CYDEF aims to offer support whenever possible, especially for modern builds. For the best results, please provide your list of in use versions to the CYDEF customer success team and they will be happy to reply back with the support status.

We currently support distributions built with Ubuntu v18 or higher, Red Hat RHEL 7 or higher, Kali 2022, Majaro 19 or higher and any distribution such as Arch Linux built with the Linux Kernel 5 or higher.

There may be cases where a specific installation on Linux will require some technical assistance from CYDEF in order to succeed. CYDEF is happy to provide this assistance free of charge for any of the above supported platforms.

An award-winning partner you can trust

Find out how we support you in winning more business!

Contact Us Today
Go to Top