CYDEF’s patented and patents-pending MDR

(effective Feb. 1, 2022)

 Incident detection

We detect modern attacks and novel and unknown threats that existing security solutions miss. This includes ransomware, PUPs, policy violations, software versioning, living off the land attacks, 0-day exploits, man-in-the-middle attacks, password spraying, crypto mining, and espionage.

 Incident notification

We’ll alert you when something is wrong. With near zero-false positives, you won’t be bombarded with unnecessary notifications.

 Incident response

When bad things happen, we investigate the situation. In addition, we can perform emergency containment. If you require assistance with additional investigation and remediation, we have a full range of professional services available (see our Incident Response Process).

 Lifetime activity retention

Activity and incident data is retained for the duration of the subscription. Raw events are stored for a period of up to 3 months.

User-friendly dashboard

We provide you with the most important metrics in real time, status of your devices, and status of any open incidents, in a convenient dashboard, accessible on desktops, tablets, and smart phones.

 Verify our work

You can see how we’ve classified activity and the events behind them. This gives you a chance to check that we’re actually doing what we say we are.

Define and report on acceptable software usage

See what software your users are running and ensure that it’s within your acceptable use policy.

 User-friendly threat hunting tools

Easy to learn and easy to use tools to search for malicious activity.

Ready to learn more?

Learn more about partnering with CYDEF and how we make your job easier!

À la carte services

Full incident report
Ransomware negotiation
Malware reverse engineering
Penetration testing
Security assessment
Table Top Exercises