ThreatDefence XDR Platform

Learn about our platform and what makes us unique.

ThreatDefence XDR Platform

Learn about our platform and what makes us unique.

Menu

Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain.  We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrolment time in the industry.

Enabling Great Security Operations Capabilities

Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behaviour analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behaviour revealing even the most hidden threats.

The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters. Our XDR platform equips cyber security experts with the insights and tools they need to perform deep investigations and contain threats, all in real time.

Our Platform

Highly customizable XDR & Threat Hunting platform, can be supplied as a SaaS subscription or deployed on any public or private cloud

_XDR

_ENDPOINT
_NETWORK     
_CLOUD
_ENDPOINT
_OSINT
_ANYTHING

Our Service

24×7 as a Service, managed Threat Hunting, and Incident Response services

_MDR

_IR
_HUNT
_SOC
Our Platform

Highly customizable XDR & Threat Hunting platform, can be supplied as a SaaS subscription or deployed on any public or private cloud

_XDR

_ENDPOINT

_NETWORK

_CLOUD

_VMS

_INTEL

_ANYTHING

Our Service

24x7 as a Service, managed Threat Hunting, and Incident Response services

_MDR

_IR

_OSINT

_SOC

Unprecedented Visibility

For every digital event in your business there is some amount of machine data generated. This machine data provides valuable insights and, if properly collected and analyzed, helps you make better security decisions. It contains a categorical record of transactions, customer activity, sensor readings, security threats and other activities. 

The only credible way to establish a robust cyber security detection and response capability is to get this data to work for you, and that is what ThreatDefence is all about. While most of the existing security solutions try to solve the threat detection problem from a particular angle, implementing their detection capabilities either at network, cloud, endpoint or perimeter level, ThreatDefence XDR platform embraces all your security data, from any environment: cloud, SaaS, network, on-premise, remote or virtual.

We collect more security events than any other vendor, correlating activities from various attack surfaces and revealing even the most covert malicious activities.

Cloud Native Platform

Our platform processes billions of security events per day, providing your Security Operations with enterprise-grade flexibility, reliability and redundancy, and scaling to accommodate your business requirements and growing data.

The XDR platform has been designed to work with massive data volumes and can work with any data source which adds value to your cyber security detection and response capability. We want your data to work for you – we guarantee that we can ingest data from your application, would it be an enterprise system, a cloud service, or a bespoke application.

Any Data

Integration guarantee for all your log sources

Multi Tenancy

Multi-tenanted indexes and dashboards for MSP and M&A scenarios

Secure

Secure and hardened platform with rich RBAC and SSO capabilities

Dashboards

Robust dashboards providing rich context for your investigations

True Elasticity

Unlimited scalability for data ingests and retention

Easy Deployment

Can be deployed to any public cloud or on-premises in hours

Any Data
Integration guarantee for all your log sources.
Secure
Secure and hardened platform with rich RBAC and SSO capabilities.
True Elasticity
Unlimited scalability for data ingest and retention.
Multi Tenancy
Multi-tenanted indexes and dashboards for MSP and M&A scenarios.
Dashboards
Robust dashboards providing rich context for your investigations.
Easy Deployment
Can be deployed to any public cloud or on-premises in hours.

Designed for Detection & Response

Our platform provides all you need to get your security operations going. We have Dark Web monitoring, Vulnerability Management, third-party risk management, security control benchmarking, rich compliance reporting, and many other features available to you from day one.

Delivered as a single integrated solution, the platform not only provides great visibility and unprecedented threat detection perspective, but also establishes great context for proactive threat hunting and rapid incident response.

Cloud Visibility

Threat detection across your Office365, Azure and AWS footprint.

Vendor Risk Reporting

Enrich your data with cyber risk reporting of your supply chain partners.

Vulnerability Management

Continuous watching of your internal, external and cloud systems.

Hunting and Response

Root cause analysis across all attack vectors and automated response capabilities.

Darkweb Monitoring

Compromised credentials and data breaches.

Cyber Risk Protection

Built-in capabilities to proactively detect data breaches and impersonation attacks.

User Behaviour

Monitor all user activities across endpoints and cloud systems and detect anomalies.

Cloud Controls Audit

Integrated cloud asset management with CIS control benchmarking.
Cloud Visibility
Threat detection across your Office365, Azure and AWS footprint.
Vulnerability Management
Continious watching of your internal, external and cloud systems.
Darkweb Monitoring
Compromised credentials and data breaches.
User Behaviour
Monitor all user activties across endpoints and cloud systems and detect anomalies.
Vendor Risk Reporting
Enrich your data with cyber risk reporting of your supply chain partners.
Hunting and Response
Root cause analysis across all attack vectors and automated response capabilities.
Cyber Risk Protection

Built-in capabilities to proactively detect data breaches and impersonation attacks.

Cloud Controls Audit

Integrated cloud asset management with CIS control benchmarking.

Full Enterprise Attack Surface Coverage

The attack surface of modern enterprises is vast like never before, comprising numerous networks domains, clouds and SaaS applications stretched across multiple geographic locations. Our platform correlates security events across all sources and applies advanced machine learning to detect sophisticated threats and provide insights over the entire enterprise’s digital footprint.

The platform is provided with lightweight sensors that can be deployed on-premises or in your cloud environments. Our Network, Endpoint and Cloud sensors can be rolled-out in minutes and start ingesting your data immediately – you will see data streaming to your dashboards in real time. We cover the entire enterprise attack surface, integrating all security systems and applications you might have, would it be your firewalls, access points, endpoint protection systems, security gateways, authentication systems or anything else.

_ENDPOINT

Advanced endpoint visibility, forensic analysis of endpoint telemetry, detection and response

_NETWORK     

Detect insider threat and lateral movement with network-based intrusion detection and packet analysis

_CLOUD

Multi-cloud security insights, cloud workload vulnerability management and continuous risk assessment

_OSINT

Continuously integrated Open Source Intelligence, including indicators from Dark Web, Social media, and third-party vulnerabilities

_ANYTHING

Any standard or custom application or log source, completely integrated into the platform

_ENDPOINT

Advanced endpoint visibility, forensic analysis of endpoint telemetry, detection and response

_NETWORK

Detect insider threat and lateral movement with network-based intrusion detection and packet analysis

_CLOUD

Multi-cloud security insights, cloud workload vulnerability management and continuous risk assessment

_OSINT

Continuously integrated Open Source Intelligence, including indicators from Dark Web, Social media, and third-party vulnerabilities

_ANYTHING

Any standard or custom application or log source, completely integrated into the platform

How it Works

ThreatDefence XDR is a secure and auto scalable platform delivered as a fully managed SaaS solution, deployed in either a single or multi-tenant configuration. With our platform, you can operationalize your data in minutes, and there are no scalability, performance or maintenance issues to worry about. The platform provides tremendous detection capabilities, and can always be augmented with our  SOC-as-a-Service, MDR, or threat hunting options.

Compliance and Reporting

We have hundreds of security metrics in our platform, and we can report on any of them. Our reporting covers security posture overview, ongoing operational issues, security trends over time, as well as various compliance frameworks such as ISO27001, APRA CPS 234, Essential Eight, PCI DSS and others.

Everything You Need to Start

It takes minutes to activate our platform for your environment, with all functionality available out of the box. Start today and get your security data to work for you.

Any Data

Integration guarantee for all your log sources.

Secure

Secure and hardened platform with rich RBAC and SSO capabilities.

True Elasticity

Unlimited scalability for data ingest and retention.

Multi Tenancy

Multi-tenanted indexes and dashboards for MSP and M&A scenarios.

Dashboards

Robust dashboards providing rich context for your investigations.

Cloud Visibility

Threat detection across your Office365, Azure and AWS footprint.

Automated Detection

Hundreds of detection use cases.

User Behaviour

Monitor all user activities across endpoints and cloud systems and detect anomalies.

Hunting and Response

Root cause analysis across all attack vectors and automated response capabilities.

MITRE ATT&CK

Integrated mapping of adversary activities into ATT&CK techniques and behaviours.

Vulnerability Management

Continious watching of your internal, external and cloud systems.

Cyber Risk Protection

Built-in capabilities to proactively detect data breaches and impersonation attacks.

Vendor Risk Reporting

Enrich your data with cyber risk reporting of your supply chain partners.

Darkweb Monitoring

Compromised credentials and data breaches.

Cloud Controls Audit

Integrated cloud asset management with CIS control benchmarking.

Any Data

Integration guarantee for all your log sources.

Secure

Secure and hardened platform with rich RBAC and SSO capabilities.

True Elasticity

Unlimited scalability for data ingest and retention.

Cloud Visibility

Threat detection across your Office365, Azure and AWS footprint.

Automated Detection

Hundreds of detection use cases.

User Behaviour

Monitor all user activties across endpoints and cloud systems and detect anomalies.

Multi Tenancy

Multi-tenanted indexes and dashboards for MSP and M&A scenarios.

Dashboards

Robust dashboards providing rich context for your investigations.

Hunting and Response

Root cause analysis across all attack vectors and automated response capabilities.

MITRE ATT&CK

Integrated mapping of adversary activities into ATT&CK techniques and behaviours.

Vulnerability Management

Continious watching of your internal, external and cloud systems.

Cyber Risk Protection

Built-in capabilities to proactively detect data breaches and impersonation attacks.

Vendor Risk Reporting

Enrich your data with cyber risk reporting of your supply chain partners.

Darkweb Monitoring

Compromised credentials and data breaches.

Cloud Controls Audit

Integrated cloud asset management with CIS control benchmarking.

Start Today For Free

At ThreatDefence, we know that seeing is believing. Lots of products claim to do wonderful things but disappoint when the rubber hits the road. For us, the opposite is true. When people see ThreatDefence live on their security data, the potential suddenly comes alive, and the value appears.

Start with us today in a carefully controlled and managed engagement, while we connect ThreatDefence to your systems, collect security data, and then work with your team to produce meaningful insights on your cyber security posture. If you like what you see, you can continue using the service on a monthly basis – and your first month will be free!

Protect Your Organisation With ThreatDefence

Protect Your Organisation With ThreatDefence

SOLUTIONS

Managed Detection and Response  

Our MDR provides end-to-end attack surface coverage, proactive threat hunting and Incident Response

Compromise Assessment 

Learn what is happening in your network right now, and get full assurance you are not compromised.

SIEM as a Service ➔

Get superior visibility and threat detection with our cloud SIEM/XDR platform, with the full service operational in minutes

Incident Response 

Get expert support through the whole incident response lifecycle

HOW IT WORKS

XDR Platform 

Get deep visibility across endpoint, network, cloud and your digital supply chain.

td_CLOUD 

Continuous cloud assurance, configuration and posture management

td_ENDPOINT 

Detect and respond to the most sophisticated endpoint threats

td_NETWORK

Always-on network monitoring for advanced threats and suspicious behaviour

PARTNERS

SOC for MSP’s  

Start providing advanced 24×7 cyber security services to your customers tomorrow

Become a Partner

Our partner program helps you start immediately and provides full support with technology, customer on-boarding, sales and marketing, as well as personalised training and reporting.

COMPANY

Who We Are 

ThreatDefence is the only Australian vendor providing innovative MDR, SOC-as-a-Service, and proactive cyber defence solutions to MSPs and Enterprises.

Careers 

We are looking for the best. Join our team, grow quickly, and become part our global success.

Case Studies

Learn what our customers say about us

Contact Us 

Our cyber security experts are ready to help. Contact us and get your answers today.