Frequently Asked Questions


If you have a question that you don’t see answered here, feel free to reach out and we’ll do our best to help clarify things for you.

How is CYDEF different?2023-08-31T18:02:03-04:00

Traditional cybersecurity solutions rely on automation to score threats based on estimated risk. However, only the threats with the highest scores are investigated by analysts due to overwhelming amounts of data and lack of resources. This leaves customers vulnerable to more sophisticated attacks, which are specifically engineered to bypass automated security tools.

At CYDEF, we don’t score threats at all. Instead, we start by classifying and filtering out what’s ‘normal’ in a business environment. Once those activities are set aside, everything that’s left over is a potential threat and gets investigated.

Our Machine Learning technology serves to make our work exponentially more efficient, empowering our analysts to make the important decisions on what is a threat and what is not. This ensures there is no guessing and no gaps.

100% of unknowns are systematically reviewed by humans — a feat that was previously unheard of.

This is why we detect threats our competitors can’t.

The result is a simple, affordable, and more effective solution. And it’s managed for you.

Why do I need CYDEF if I have a firewall and anti-virus?2023-08-31T18:24:38-04:00

Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through.

Sadly, every business is at risk. Cyber criminals use your devices to conduct illegal activity, hold your data hostage, and spread their malware to others (including your clients). The SolarWinds Supply Chain attack of 2020 is a perfect example. Criminals used SolarWinds to infect thousands of other organizations.

And they aren’t only targeting large enterprises. If you have computers connected to the Internet and data that is valuable to you, your staff, or your clients — you’re at risk.

It’s no longer a matter of if a business will be breached, it’s when.

We get it. That sounds like fear mongering.

But sadly, it’s true. In fact, cyber insurance companies no longer offer $10 million policies for that very reason. And even the insurance companies themselves are not immune.

So don’t wait until it’s too late. Contact us today to protect your business with a simple, effective solution that won’t break the bank.

I’ve already been attacked, what are the odds it will happen again?2022-10-24T14:15:42-04:00

Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals know that most people make this assumption and don’t make any changes to their cybersecurity profile. So they give your business just enough time to recover before they come after you again.

What do I need to sign up?2022-05-27T13:02:51-04:00

The only thing you need is a business email address. You don’t need a credit card and you won’t be asked to sign a contract. Simply fill out the form with your business email and we’ll send you what you need.

What type of malware does CYDEF detect?2023-08-31T17:40:04-04:00

Due to our unique method of investigating 100% of unknowns, we can detect malware that evades firewalls, anti-virus, and automated security tools. This includes known and unknown threats, such as:

  • Ransomware precursors

  • Corporate espionage

  • Insider threats

  • Potentially Unwanted Programs (PUPs)

  • Novel threats that have not been added to anti-virus signature lists

  • Zero-day attacks

  • Pirated media

  • Phishing

  • Crypto mining

  • Attacks leveraging native system utilities (via Living Off the Land Attacks)

  • Attacks exploiting trusted programs (e.g., Microsoft Word)

  • Integrated threat intelligence to easily identify attack markers

  • Risky employee behavior (e.g., downloading cracked software, plaintext password files, etc.)

What happens after I sign up?2023-08-31T18:10:41-04:00

You’ll receive an email from our team with a link to download our light-weight SMART-Monitor agent and a key that is unique to your organization.

You’ll need to install the agent on every laptop, desktop, and server in your organization. If you only install it on a few devices, you won’t be fully protected… That’s like locking your front door, but leaving all the windows wide open. We can’t keep your business safe that way.

Once you start installing, we’ll confirm your endpoints are sending telemetry as expected and you’ll be granted access to our SMART-Monitor and support portals.

SMART-Monitor Dashboard
(click to enlarge)

How many devices can I protect?2023-08-31T18:13:22-04:00

There is no minimum. You can install our agent on as many endpoints (desktops, laptops, and servers) as you have, even during a trial.

Twenty? No problem. Twenty thousand? Fine by us.

What if I already have a cybersecurity solution in place?2023-08-31T18:04:33-04:00

Our SMART-Monitor agent is compatible with most other cybersecurity solutions, so it shouldn’t be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.

Where can I find pricing?2023-08-31T18:16:05-04:00

We would be happy to send you pricing information. Our pricing model is very simple — it’s based on the number of endpoints (desktops, laptops, and servers). Please contact us to learn more.

What is the frequency of reports?2023-08-31T18:25:47-04:00

Customer portal access is provided so reports can be accessed in real time 24/7.

What level of Security Operations Center (SOC) compliance does your SOC maintain?2023-09-01T08:48:59-04:00

We have a SOC 2 Type 2 attestation.

How much bandwidth is required?2023-08-31T18:25:42-04:00

All data processing is done in the cloud, so the impact on your system is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.

What are the minimum technical requirements?2023-07-24T08:31:15-04:00

Minimum technical requirements

  • System resources: 2GB RAM, 1GB in disk space
  • Internet access with ports 443, 5671, and 5672 open for outbound communications between the agent and the Internet*
  • Bandwidth: approx. 3 GB/mo/device (varies)


The CYDEF Agent is compatible with all currently supported versions of Windows, found here:

For existing customers with Windows or Windows Server versions that have passed end of support or end of extended support: We will continue to provide service with the installed version of the agent, but no updates to the agent or SYSMON will be provided. Customers assume all risks for known and unknown vulnerabilities discovered in these older products.


  • macOS: Catalina 10.15+


Linux Servers operate on  many different variants and distributions. As a general rule, CYDEF aims to offer support whenever possible, especially for modern builds. For the best results, please provide your list of in use versions to the CYDEF customer success team and they will be happy to reply back with the support status.

We currently support distributions built with Ubuntu v18 or higher, Red Hat RHEL 7 or higher, Kali 2022, Majaro 19 or higher and any distribution such as Arch Linux built with the Linux Kernel 5 or higher.

There may be cases where a specific installation on Linux will require some technical assistance from CYDEF in order to succeed. CYDEF is happy to provide this assistance free of charge for any of the above supported platforms.

Last updated: July 6, 2023

Recent Blog Posts

Go to Top