Weekly Scans · Daily Detection · Endpoint Monitoring
Weekly Scans · Daily Detection · Endpoint Monitoring
Weekly Scans · Daily Detection · Endpoint Monitoring

The complete package. Nothing gets past you.

Citadel is everything we offer, combined. Weekly vulnerability scanning, daily threat detection, and around-the-clock server monitoring - so you know what's vulnerable and what's actually happening, every single week. We monitor data breaches for your domain, send you a monthly threat briefing tailored to your sector, and provide an "iSOS Verified" badge you can display on your website. When something critical happens, you hear about it immediately.

£449 /month Min. 6 months
£449 /month Min. 6 months
£449 /month Min. 6 months
Citadel Overview
A+
0
Critical
0
High
10
Endpoints
Weekly scan
Complete
Breach monitoring
No exposures
Endpoint monitoring
All healthy
iSOS Verified Active Citadel subscription · Badge ready to deploy
Citadel Overview
A+
0
Critical
0
High
10
Endpoints
Weekly scan
Complete
Breach monitoring
No exposures
Endpoint monitoring
All healthy
iSOS Verified Active Citadel subscription · Badge ready to deploy
Citadel Overview
A+
0
Critical
0
High
10
Endpoints
Weekly scan
Complete
Breach monitoring
No exposures
Endpoint monitoring
All healthy
iSOS Verified Active Citadel subscription · Badge ready to deploy

New vulnerabilities don't wait for weekly scans. Neither do we.

Even with weekly full scans, there are six days between each one. Daily threat detection fills that gap. Every night, we check your systems against over 8,000 vulnerability templates updated continuously from public security advisories. Critical findings trigger an immediate email alert - you don't wait for Friday's report.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

You get an email alert within hours when a Critical or High severity issue is detected, from daily scans, weekly scans, or endpoint monitoring. You never wait for a report to hear about something urgent.

Smart, not noisy

Daily checks are lightweight and targeted, they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

You get an email alert within hours when a Critical or High severity issue is detected, from daily scans, weekly scans, or endpoint monitoring. You never wait for a report to hear about something urgent.

Smart, not noisy

Daily checks are lightweight and targeted, they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

You get an email alert within hours when a Critical or High severity issue is detected, from daily scans, weekly scans, or endpoint monitoring. You never wait for a report to hear about something urgent.

Smart, not noisy

Daily checks are lightweight and targeted, they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Full external scan. Every week.

Where Shield and Sentinel run full scans monthly, Citadel runs them weekly. Every week, we scan up to 15 public-facing IPs and 3 web applications against over 100,000 known vulnerabilities. Faster detection, quicker verification that fixes worked, and a tighter feedback loop between finding and fixing.

Known vulnerabilities (CVEs)

100,000+ known vulnerabilities checked every week. If there's a published exploit for something you're running, we'll find it, not once a month, every Friday.

Open ports and exposed services

Every open port mapped weekly. Databases, admin panels, file shares, and dev tools that shouldn't be public-facing get flagged before they're found by someone else.

Outdated software

Old versions of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known issues, weekly scanning means we catch it faster.

Default and weak credentials

Default passwords on admin panels, databases, FTP servers, SNMP, and management interfaces, tested every week.

SSL/TLS configuration

Protocol versions, cipher strength, certificate validity, and HSTS, checked weekly so issues don't sit unnoticed between scans.

Email security

SPF, DKIM, and DMARC records checked weekly. Missing or misconfigured records let attackers send email that looks like it came from you.

DNS configuration

Zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked, reviewed every week.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, and configuration weaknesses, caught and reported before they can be exploited.

Known vulnerabilities (CVEs)

100,000+ known vulnerabilities checked every week. If there's a published exploit for something you're running, we'll find it, not once a month, every Friday.

Open ports and exposed services

Every open port mapped weekly. Databases, admin panels, file shares, and dev tools that shouldn't be public-facing get flagged before they're found by someone else.

Outdated software

Old versions of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known issues, weekly scanning means we catch it faster.

Default and weak credentials

Default passwords on admin panels, databases, FTP servers, SNMP, and management interfaces, tested every week.

SSL/TLS configuration

Protocol versions, cipher strength, certificate validity, and HSTS, checked weekly so issues don't sit unnoticed between scans.

Email security

SPF, DKIM, and DMARC records checked weekly. Missing or misconfigured records let attackers send email that looks like it came from you.

DNS configuration

Zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked, reviewed every week.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, and configuration weaknesses, caught and reported before they can be exploited.

Known vulnerabilities (CVEs)

100,000+ known vulnerabilities checked every week. If there's a published exploit for something you're running, we'll find it, not once a month, every Friday.

Open ports and exposed services

Every open port mapped weekly. Databases, admin panels, file shares, and dev tools that shouldn't be public-facing get flagged before they're found by someone else.

Outdated software

Old versions of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known issues, weekly scanning means we catch it faster.

Default and weak credentials

Default passwords on admin panels, databases, FTP servers, SNMP, and management interfaces, tested every week.

SSL/TLS configuration

Protocol versions, cipher strength, certificate validity, and HSTS, checked weekly so issues don't sit unnoticed between scans.

Email security

SPF, DKIM, and DMARC records checked weekly. Missing or misconfigured records let attackers send email that looks like it came from you.

DNS configuration

Zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked, reviewed every week.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, and configuration weaknesses, caught and reported before they can be exploited.

Web application security testing - up to 3 applications

We test your web applications against the OWASP Top 10 - the industry-standard list of the most critical web security risks. Citadel covers up to 3 web applications, each scanned weekly.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

24/7 server monitoring on up to 10 endpoints

We deploy lightweight security agents on up to 10 of your servers that monitor around the clock - detecting file changes, malware, rootkits, and suspicious activity as it happens. Twice the endpoint coverage of Sentinel, with the same depth of monitoring.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs: authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically.

Vulnerability detection

Every package and library on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know before the next external scan picks it up.

Security configuration assessment

We assess your server configurations against CIS benchmarks. Weak SSH settings, permissive file permissions, unnecessary services, missing patches. You get a pass/fail score with specific guidance on fixing failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert. A suspicious file change at 3am, a brute-force login at midnight, a new CVE affecting your packages. You hear about it straight away.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs: authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically.

Vulnerability detection

Every package and library on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know before the next external scan picks it up.

Security configuration assessment

We assess your server configurations against CIS benchmarks. Weak SSH settings, permissive file permissions, unnecessary services, missing patches. You get a pass/fail score with specific guidance on fixing failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert. A suspicious file change at 3am, a brute-force login at midnight, a new CVE affecting your packages. You hear about it straight away.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs: authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically.

Vulnerability detection

Every package and library on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know before the next external scan picks it up.

Security configuration assessment

We assess your server configurations against CIS benchmarks. Weak SSH settings, permissive file permissions, unnecessary services, missing patches. You get a pass/fail score with specific guidance on fixing failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert. A suspicious file change at 3am, a brute-force login at midnight, a new CVE affecting your packages. You hear about it straight away.

What only Citadel clients get

Beyond scanning and monitoring, Citadel includes three features designed for businesses that take security seriously enough to make it visible.

Data Breach Monitoring

We check whether your domain and email addresses appear in known data breaches. If staff credentials have been exposed in a third-party breach, you need to know. We check monthly and report any new exposures immediately.

Monthly Threat Briefing

Once a month, we send you a curated summary of emerging threats relevant to your sector. New vulnerabilities being actively exploited, attack trends targeting businesses like yours, and practical steps to stay ahead. Written in plain English.

iSOS Verified Badge

Display the iSOS Verified badge on your website to show clients, partners, and regulators that your business is under continuous professional security monitoring. The badge links to a verification page confirming your active Citadel subscription.

Data Breach Monitoring

We check whether your domain and email addresses appear in known data breaches. If staff credentials have been exposed in a third-party breach, you need to know. We check monthly and report any new exposures immediately.

Monthly Threat Briefing

Once a month, we send you a curated summary of emerging threats relevant to your sector. New vulnerabilities being actively exploited, attack trends targeting businesses like yours, and practical steps to stay ahead. Written in plain English.

iSOS Verified Badge

Display the iSOS Verified badge on your website to show clients, partners, and regulators that your business is under continuous professional security monitoring. The badge links to a verification page confirming your active Citadel subscription.

Data Breach Monitoring

We check whether your domain and email addresses appear in known data breaches. If staff credentials have been exposed in a third-party breach, you need to know. We check monthly and report any new exposures immediately.

Monthly Threat Briefing

Once a month, we send you a curated summary of emerging threats relevant to your sector. New vulnerabilities being actively exploited, attack trends targeting businesses like yours, and practical steps to stay ahead. Written in plain English.

iSOS Verified Badge

Display the iSOS Verified badge on your website to show clients, partners, and regulators that your business is under continuous professional security monitoring. The badge links to a verification page confirming your active Citadel subscription.

Weekly reports. Monthly summaries. Complete visibility.

Citadel clients receive a combined report every week covering scan results and monitoring data, plus a monthly summary with trend analysis. You always know where you stand.

Weekly Combined Report

Every Friday, you receive a report covering that week's scan findings and monitoring activity. New vulnerabilities, resolved issues, file integrity events, alert summary, and CIS benchmark status, all in one document.

Monthly Summary

On the first of each month, we compile a summary from the weekly reports. Trend analysis across scanning and monitoring, overall posture trajectory, breach monitoring results, and threat briefing included.

Security Score (A-F)

Every report starts with a clear grade combining scan results, monitoring health, and configuration compliance. Boards and management teams understand A-F without needing CVSS explained.

Priority Email Support

Got a question about a finding? Need help interpreting a report? Citadel clients get priority email support with next business day response. You're not left alone with a PDF.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

Weekly Combined Report

Every Friday, you receive a report covering that week's scan findings and monitoring activity. New vulnerabilities, resolved issues, file integrity events, alert summary, and CIS benchmark status, all in one document.

Monthly Summary

On the first of each month, we compile a summary from the weekly reports. Trend analysis across scanning and monitoring, overall posture trajectory, breach monitoring results, and threat briefing included.

Security Score (A-F)

Every report starts with a clear grade combining scan results, monitoring health, and configuration compliance. Boards and management teams understand A-F without needing CVSS explained.

Priority Email Support

Got a question about a finding? Need help interpreting a report? Citadel clients get priority email support with next business day response. You're not left alone with a PDF.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

Weekly Combined Report

Every Friday, you receive a report covering that week's scan findings and monitoring activity. New vulnerabilities, resolved issues, file integrity events, alert summary, and CIS benchmark status, all in one document.

Monthly Summary

On the first of each month, we compile a summary from the weekly reports. Trend analysis across scanning and monitoring, overall posture trajectory, breach monitoring results, and threat briefing included.

Security Score (A-F)

Every report starts with a clear grade combining scan results, monitoring health, and configuration compliance. Boards and management teams understand A-F without needing CVSS explained.

Priority Email Support

Got a question about a finding? Need help interpreting a report? Citadel clients get priority email support with next business day response. You're not left alone with a PDF.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

What's Included

Weekly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 15 public-facing IPs and 3 web applications
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 10 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Data breach monitoring for your domain
iSOS Verified badge for your website
Monthly threat briefing tailored to your sector
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Weekly combined report covering scans and monitoring
Monthly summary report with trend analysis
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Immediate email alerts for Critical/High severity events
Priority email support (next business day response)
Weekly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 15 public-facing IPs and 3 web applications
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 10 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Data breach monitoring for your domain
iSOS Verified badge for your website
Monthly threat briefing tailored to your sector
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Weekly combined report covering scans and monitoring
Monthly summary report with trend analysis
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Immediate email alerts for Critical/High severity events
Priority email support (next business day response)
Weekly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 15 public-facing IPs and 3 web applications
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 10 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Data breach monitoring for your domain
iSOS Verified badge for your website
Monthly threat briefing tailored to your sector
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Weekly combined report covering scans and monitoring
Monthly summary report with trend analysis
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Immediate email alerts for Critical/High severity events
Priority email support (next business day response)

Is Citadel right for you?

Citadel is for

  • Businesses that handle sensitive client data, financial information, or personal records
  • Organisations with compliance requirements (Cyber Essentials, ISO 27001, PCI DSS, GDPR)
  • Companies where a breach would make the news or trigger regulatory action
  • IT teams that want comprehensive, always-on security without building an in-house SOC
  • Anyone who wants to demonstrate to clients and partners that security is taken seriously (iSOS Verified badge)

Important to know

  • Citadel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test
  • For custom scoping, higher limits, compliance-specific reporting, or dedicated SLAs, see Enterprise
  • For businesses on shared hosting without server access, Shield is the right starting point

Citadel is for

  • Businesses that handle sensitive client data, financial information, or personal records
  • Organisations with compliance requirements (Cyber Essentials, ISO 27001, PCI DSS, GDPR)
  • Companies where a breach would make the news or trigger regulatory action
  • IT teams that want comprehensive, always-on security without building an in-house SOC
  • Anyone who wants to demonstrate to clients and partners that security is taken seriously (iSOS Verified badge)

Important to know

  • Citadel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test
  • For custom scoping, higher limits, compliance-specific reporting, or dedicated SLAs, see Enterprise
  • For businesses on shared hosting without server access, Shield is the right starting point

Citadel is for

  • Businesses that handle sensitive client data, financial information, or personal records
  • Organisations with compliance requirements (Cyber Essentials, ISO 27001, PCI DSS, GDPR)
  • Companies where a breach would make the news or trigger regulatory action
  • IT teams that want comprehensive, always-on security without building an in-house SOC
  • Anyone who wants to demonstrate to clients and partners that security is taken seriously (iSOS Verified badge)

Important to know

  • Citadel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test
  • For custom scoping, higher limits, compliance-specific reporting, or dedicated SLAs, see Enterprise
  • For businesses on shared hosting without server access, Shield is the right starting point

How it works

1

Sign up and tell us what to protect

Fill in the form with your domains, IP addresses (up to 15), web application URLs (up to 3), and details of the servers you want monitored (up to 10).

2

Verify your domains

We'll give you a DNS TXT record to add to each domain. Standard practice, takes two minutes per domain.

3

We configure everything

Within 48 hours of payment and verification, your daily threat detection is live and your first weekly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers.

4

Agents go live

Monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one. Breach monitoring for your domain begins.

5

Your first report lands

Within 5 working days, you'll receive your first combined report. Your iSOS Verified badge is ready to deploy on your website.

6

Ongoing protection

Daily threat detection every night. Weekly full scans every Friday. Monitoring agents watching around the clock. Breach checks monthly. Critical events trigger immediate alerts. Weekly and monthly reports show the full picture.

1

Sign up and tell us what to protect

Fill in the form with your domains, IP addresses (up to 15), web application URLs (up to 3), and details of the servers you want monitored (up to 10).

2

Verify your domains

We'll give you a DNS TXT record to add to each domain. Standard practice, takes two minutes per domain.

3

We configure everything

Within 48 hours of payment and verification, your daily threat detection is live and your first weekly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers.

4

Agents go live

Monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one. Breach monitoring for your domain begins.

5

Your first report lands

Within 5 working days, you'll receive your first combined report. Your iSOS Verified badge is ready to deploy on your website.

6

Ongoing protection

Daily threat detection every night. Weekly full scans every Friday. Monitoring agents watching around the clock. Breach checks monthly. Critical events trigger immediate alerts. Weekly and monthly reports show the full picture.

1

Sign up and tell us what to protect

Fill in the form with your domains, IP addresses (up to 15), web application URLs (up to 3), and details of the servers you want monitored (up to 10).

2

Verify your domains

We'll give you a DNS TXT record to add to each domain. Standard practice, takes two minutes per domain.

3

We configure everything

Within 48 hours of payment and verification, your daily threat detection is live and your first weekly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers.

4

Agents go live

Monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one. Breach monitoring for your domain begins.

5

Your first report lands

Within 5 working days, you'll receive your first combined report. Your iSOS Verified badge is ready to deploy on your website.

6

Ongoing protection

Daily threat detection every night. Weekly full scans every Friday. Monitoring agents watching around the clock. Breach checks monthly. Critical events trigger immediate alerts. Weekly and monthly reports show the full picture.

A quick comparison

For anyone deciding between the three packages.

Shield Sentinel Citadel
Full scan frequency Monthly Monthly Weekly
Daily threat detection
Public-facing IPs Up to 5 Up to 10 Up to 15
Web applications 1 1 3
Endpoint monitoring - Up to 5 Up to 10
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Breach monitoring - -
Threat briefing - - Monthly
iSOS Verified badge - -
Reporting Monthly Monthly Weekly + Monthly
Immediate alerts - Critical/High Critical/High
Priority support - - Next business day
Price £99/month £229/month £449/month

All packages include daily threat detection and monthly reporting. Sentinel adds endpoint monitoring. Citadel adds weekly scanning, breach monitoring, threat intelligence, and the iSOS Verified badge.

Shield Sentinel Citadel
Full scan frequency Monthly Monthly Weekly
Daily threat detection
Public-facing IPs Up to 5 Up to 10 Up to 15
Web applications 1 1 3
Endpoint monitoring - Up to 5 Up to 10
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Breach monitoring - -
Threat briefing - - Monthly
iSOS Verified badge - -
Reporting Monthly Monthly Weekly + Monthly
Immediate alerts - Critical/High Critical/High
Priority support - - Next business day
Price £99/month £229/month £449/month

Citadel is the complete package, weekly scanning, full endpoint coverage, breach monitoring, threat intelligence, and the iSOS Verified badge.

Shield Sentinel Citadel
Full scan frequency Monthly Monthly Weekly
Daily threat detection
Public-facing IPs Up to 5 Up to 10 Up to 15
Web applications 1 1 3
Endpoint monitoring - Up to 5 Up to 10
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Breach monitoring - -
Threat briefing - - Monthly
iSOS Verified badge - -
Reporting Monthly Monthly Weekly + Monthly
Immediate alerts - Critical/High Critical/High
Priority support - - Next business day
Price £99/month £229/month £449/month

Citadel is the complete package, weekly scanning, full endpoint coverage, breach monitoring, threat intelligence, and the iSOS Verified badge.

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£449/month
Minimum 6-month commitment

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£449/month
Minimum 6-month commitment

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£449/month
Minimum 6-month commitment
Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.