
iSOS Security
Is Your Business As Secure
As You Think?
Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.
iSOS Security
Is Your Business As Secure
As You Think?
Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.
iSOS Security
Is Your Business As Secure
As You Think?
Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.
Choose Your Level of Protection
Every tier includes daily threat detection as standard. Pick the scope that fits your business.
Shield
External protection
Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.
6-month minimum
What's included
- Comprehensive external vulnerability scan, run monthly
- Daily checks for newly published exploits
- Security score (A–F grade) in every report
- SSL certificate expiry monitoring
- We flag unexpected exposed services
- Professional PDF report with remediation guidance
- Immediate alerts for Critical/High findings
- Trend tracking
- Covers 1 website
Sentinel
External + internal protection
Everything in Shield, plus continuous monitoring of your servers and devices. We watch for file tampering, hidden malware, and suspicious activity on the inside.
6-month minimum
Everything in Shield, plus
- Critical file tampering alerts
- Hidden malware and rootkit detection
- Security configuration checks (CIS standards)
- System activity monitoring and log analysis
- Monthly report covering scans and monitoring
- Covers 2 websites
Citadel
Complete coverage
Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.
12-month minimum
Everything in Sentinel, plus
- Weekly comprehensive scans
- Weekly report covering scans and monitoring
- Data breach and credential monitoring
- Container and infrastructure security scanning
- Email vulnerability summaries
- Covers 5 websites
- Priority email support (next business day)
Enterprise
Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.
Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.
Get in TouchChoose Your Level of Protection
Every tier includes daily threat detection as standard. Pick the scope that fits your business.
Shield
External protection
Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.
6-month minimum
What's included
- Comprehensive external vulnerability scan, run monthly
- Daily checks for newly published exploits
- Security score (A–F grade) in every report
- SSL certificate expiry monitoring
- We flag unexpected exposed services
- Professional PDF report with remediation guidance
- Immediate alerts for Critical/High findings
- Trend tracking
- Covers 1 website
Sentinel
External + internal protection
Everything in Shield, plus continuous monitoring of your servers and devices. We watch for file tampering, hidden malware, and suspicious activity on the inside.
6-month minimum
Everything in Shield, plus
- Critical file tampering alerts
- Hidden malware and rootkit detection
- Security configuration checks (CIS standards)
- System activity monitoring and log analysis
- Monthly report covering scans and monitoring
- Covers 2 websites
Citadel
Complete coverage
Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.
12-month minimum
Everything in Sentinel, plus
- Weekly comprehensive scans
- Weekly report covering scans and monitoring
- Data breach and credential monitoring
- Container and infrastructure security scanning
- Email vulnerability summaries
- Covers 5 websites
- Priority email support (next business day)
Enterprise
Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.
Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.
Get in TouchChoose Your Level of Protection
Every tier includes daily threat detection as standard. Pick the scope that fits your business.
Shield
External protection
Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.
6-month minimum
What's included
- Comprehensive external vulnerability scan, run monthly
- Daily checks for newly published exploits
- Security score (A–F grade) in every report
- SSL certificate expiry monitoring
- We flag unexpected exposed services
- Professional PDF report with remediation guidance
- Immediate alerts for Critical/High findings
- Trend tracking
- Covers 1 website
Sentinel
External + internal protection
Everything in Shield, plus continuous monitoring of your servers and devices. We watch for file tampering, hidden malware, and suspicious activity on the inside.
6-month minimum
Everything in Shield, plus
- Critical file tampering alerts
- Hidden malware and rootkit detection
- Security configuration checks (CIS standards)
- System activity monitoring and log analysis
- Monthly report covering scans and monitoring
- Covers 2 websites
Citadel
Complete coverage
Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.
12-month minimum
Everything in Sentinel, plus
- Weekly comprehensive scans
- Weekly report covering scans and monitoring
- Data breach and credential monitoring
- Container and infrastructure security scanning
- Email vulnerability summaries
- Covers 5 websites
- Priority email support (next business day)
Enterprise
Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.
Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.
Get in TouchQuick Comparison
Quick Comparison
| Capability | Shield | Sentinel | Citadel |
|---|---|---|---|
| External vulnerability scanning | Monthly | Monthly | Weekly |
| Daily exploit checks | ✓ | ✓ | ✓ |
| Websites tested iA deeper scan of the website itself, testing for injection attacks, broken authentication, and security misconfigurations (OWASP Top 10). Separate from the server scan. | 1 | 2 | 5 |
| Server/device monitoring iWe install a lightweight security agent on your servers that watches for suspicious activity 24/7: file changes, malware, failed logins, configuration drift, and more. | × | 5 | 10 |
| File tampering alerts iWe monitor critical files on your servers and alert you if anything is changed, added, or deleted unexpectedly. This catches attackers modifying system files, planting backdoors, or tampering with your application. | × | ✓ | ✓ |
| Malware and rootkit detection iWe scan your servers for hidden malicious software (malware) and rootkits, which are tools attackers use to maintain secret access to a system after breaking in. | × | ✓ | ✓ |
| CIS configuration checks iYour server settings are checked against the Centre for Internet Security benchmarks: industry-standard rules for how a server should be configured securely. | × | ✓ | ✓ |
| Data breach monitoring iWe check if your company's domain has appeared in any known data breaches, so you can act before stolen credentials are used against you. | × | × | ✓ |
| Report | Monthly | Monthly (scans + monitoring) | Weekly (scans + monitoring) |
| Immediate Critical/High alerts | ✓ | ✓ | ✓ |
| SSL monitoring + unexpected service detection | ✓ | ✓ | ✓ |
| Email vulnerability summaries | × | × | ✓ |
| Container and infrastructure security scanning | × | × | ✓ |
Quick Comparison
| Capability | Shield | Sentinel | Citadel |
|---|---|---|---|
| External vulnerability scanning | Monthly | Monthly | Weekly |
| Daily exploit checks | ✓ | ✓ | ✓ |
| Websites tested iA deeper scan of the website itself, testing for injection attacks, broken authentication, and security misconfigurations (OWASP Top 10). Separate from the server scan. | 1 | 2 | 5 |
| Server/device monitoring iWe install a lightweight security agent on your servers that watches for suspicious activity 24/7: file changes, malware, failed logins, configuration drift, and more. | × | 5 | 10 |
| File tampering alerts iWe monitor critical files on your servers and alert you if anything is changed, added, or deleted unexpectedly. This catches attackers modifying system files, planting backdoors, or tampering with your application. | × | ✓ | ✓ |
| Malware and rootkit detection iWe scan your servers for hidden malicious software (malware) and rootkits, which are tools attackers use to maintain secret access to a system after breaking in. | × | ✓ | ✓ |
| CIS configuration checks iYour server settings are checked against the Centre for Internet Security benchmarks: industry-standard rules for how a server should be configured securely. | × | ✓ | ✓ |
| Data breach monitoring iWe check if your company's domain has appeared in any known data breaches, so you can act before stolen credentials are used against you. | × | × | ✓ |
| Report | Monthly | Monthly (scans + monitoring) | Weekly (scans + monitoring) |
| Immediate Critical/High alerts | ✓ | ✓ | ✓ |
| SSL monitoring + unexpected service detection | ✓ | ✓ | ✓ |
| Email vulnerability summaries | × | × | ✓ |
| Container and infrastructure security scanning | × | × | ✓ |
How We Compare
iSOS bundles scanning, server monitoring, and professional reporting as standard.
Scroll to see all →
| Feature | iSOS | Intruder | HostedScan | Pentest-Tools |
|---|---|---|---|---|
| External vulnerability scanning | ✓ | ✓ | ✓ | ✓ |
| Daily checks for newly published exploits | ✓ | ✓ | ✓ | × |
| Web application testing | ✓ | ✓ | ✓ | ✓ |
| Always-on agent-based device monitoring | ✓ | × | × | × |
| Professional managed security report | ✓ | × | × | × |
| Immediate Critical/High alerts | ✓ | ✓ | ✓ | × |
| SSL certificate monitoring | ✓ | ✓ | ✓ | ✓ |
| Security score and trend tracking | ✓ | ✓ | ✓ | × |
| Data breach monitoring | ✓ | × | × | × |
| UK-based team | ✓ | ✓ | × | × |
| Flat monthly pricing | ✓ | × | ✓ | ✓ |
| Direct access to security professionals | ✓ | × | × | × |
Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.
How We Compare
Most competitors charge similar prices for scanning alone. iSOS bundles scanning, server monitoring, and professional reporting as standard.
| Feature | iSOS | Intruder | HostedScan | Pentest-Tools |
|---|---|---|---|---|
| External vulnerability scanning | ✓ | ✓ | ✓ | ✓ |
| Daily checks for newly published exploits | ✓ | ✓ | ✓ | × |
| Web application testing | ✓ | ✓ | ✓ | ✓ |
| Always-on agent-based device monitoring | ✓ | × | × | × |
| Professional managed security report | ✓ | × | × | × |
| Immediate Critical/High alerts | ✓ | ✓ | ✓ | × |
| SSL certificate monitoring | ✓ | ✓ | ✓ | ✓ |
| Security score and trend tracking | ✓ | ✓ | ✓ | × |
| Data breach monitoring | ✓ | × | × | × |
| UK-based team | ✓ | ✓ | × | × |
| Flat monthly pricing | ✓ | × | ✓ | ✓ |
| Direct access to security professionals | ✓ | × | × | × |
Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.
How We Compare
Most competitors charge similar prices for scanning alone. iSOS bundles scanning, server monitoring, and professional reporting as standard.
| Feature | iSOS | Intruder | HostedScan | Pentest-Tools |
|---|---|---|---|---|
| External vulnerability scanning | ✓ | ✓ | ✓ | ✓ |
| Daily checks for newly published exploits | ✓ | ✓ | ✓ | × |
| Web application testing | ✓ | ✓ | ✓ | ✓ |
| Always-on agent-based device monitoring | ✓ | × | × | × |
| Professional managed security report | ✓ | × | × | × |
| Immediate Critical/High alerts | ✓ | ✓ | ✓ | × |
| SSL certificate monitoring | ✓ | ✓ | ✓ | ✓ |
| Security score and trend tracking | ✓ | ✓ | ✓ | × |
| Data breach monitoring | ✓ | × | × | × |
| UK-based team | ✓ | ✓ | × | × |
| Flat monthly pricing | ✓ | × | ✓ | ✓ |
| Direct access to security professionals | ✓ | × | × | × |
Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.
We Don't Stop at the Alert
When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.
Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.
We Don't Stop at the Alert
When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.
Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.
We Don't Stop at the Alert
When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.
Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.
Under the Hood
For the technical decision-makers. Here's the depth of what our platform covers.
Network Scanning
- Full TCP port scan + top 100 UDP
- CVE matching against 75,000+ known vulnerabilities
- Service fingerprinting and version detection
- Misconfiguration detection
- Shadow IT / unexpected service discovery
Web Application Testing
- OWASP Top 10 automated assessment
- SQL injection, XSS, command injection
- Security header analysis (CSP, HSTS, etc.)
- Authentication and session testing
- Information disclosure checks
Daily Threat Detection
- Template-based exploit scanning
- Checks against newly published CVEs
- Runs between comprehensive scans
- Catches newly published exploits within 24 hours of disclosure
Server Monitoring
- Critical file integrity monitoring
- Rootkit and malware detection
- Software vulnerability checks (CVE matching)
- System activity and log analysis
- CIS benchmark compliance checks
SSL/TLS and Email
- Certificate chain validation
- Protocol and cipher suite assessment
- OCSP revocation checks
- SPF, DKIM, and DMARC validation
- Expiry alerts at 30/14/7 days
Container Security
- Docker image vulnerability scanning
- OS package CVE detection
- Infrastructure-as-code misconfiguration checks
- SBOM generation
- Secret detection in container layers
Under the Hood
For the technical decision-makers. Here's the depth of what our platform covers.
Network Scanning
- Full TCP port scan + top 100 UDP
- CVE matching against 75,000+ known vulnerabilities
- Service fingerprinting and version detection
- Misconfiguration detection
- Shadow IT / unexpected service discovery
Web Application Testing
- OWASP Top 10 automated assessment
- SQL injection, XSS, command injection
- Security header analysis (CSP, HSTS, etc.)
- Authentication and session testing
- Information disclosure checks
Daily Threat Detection
- Template-based exploit scanning
- Checks against newly published CVEs
- Runs between comprehensive scans
- Catches newly published exploits within 24 hours of disclosure
Server Monitoring
- Critical file integrity monitoring
- Rootkit and malware detection
- Software vulnerability checks (CVE matching)
- System activity and log analysis
- CIS benchmark compliance checks
SSL/TLS and Email
- Certificate chain validation
- Protocol and cipher suite assessment
- OCSP revocation checks
- SPF, DKIM, and DMARC validation
- Expiry alerts at 30/14/7 days
Container Security
- Docker image vulnerability scanning
- OS package CVE detection
- Infrastructure-as-code misconfiguration checks
- SBOM generation
- Secret detection in container layers
Under the Hood
For the technical decision-makers. Here's the depth of what our platform covers.
Network Scanning
- Full TCP port scan + top 100 UDP
- CVE matching against 75,000+ known vulnerabilities
- Service fingerprinting and version detection
- Misconfiguration detection
- Shadow IT / unexpected service discovery
Web Application Testing
- OWASP Top 10 automated assessment
- SQL injection, XSS, command injection
- Security header analysis (CSP, HSTS, etc.)
- Authentication and session testing
- Information disclosure checks
Daily Threat Detection
- Template-based exploit scanning
- Checks against newly published CVEs
- Runs between comprehensive scans
- Catches newly published exploits within 24 hours of disclosure
Server Monitoring
- Critical file integrity monitoring
- Rootkit and malware detection
- Software vulnerability checks (CVE matching)
- System activity and log analysis
- CIS benchmark compliance checks
SSL/TLS and Email
- Certificate chain validation
- Protocol and cipher suite assessment
- OCSP revocation checks
- SPF, DKIM, and DMARC validation
- Expiry alerts at 30/14/7 days
Container Security
- Docker image vulnerability scanning
- OS package CVE detection
- Infrastructure-as-code misconfiguration checks
- SBOM generation
- Secret detection in container layers
Need Something More?
Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.
Grey-Box Testing
We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.
Get a Quote →White-Box Testing
Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.
Get a Quote →Need Something More?
Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.
Grey-Box Testing
We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.
Get a Quote →White-Box Testing
Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.
Get a Quote →Need Something More?
Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.
Grey-Box Testing
We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.
Get a Quote →White-Box Testing
Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.
Get a Quote →What We Do
Tech Solutions for Tomorrow
Web Development
Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.
Read MoreClaris Databases
With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.
Read MoremacOS & Windows Support
We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.
Read MoreReady to Elevate Your Digital Presence?
Don't get left behind
Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.
Stay Connected with iSOS
Copyright: © 2026 iSOS. All Rights Reserved.
What We Do
Tech Solutions for Tomorrow
Web Development
Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.
Read MoreClaris Databases
With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.
Read MoremacOS & Windows Support
We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.
Read MoreReady to Elevate Your Digital Presence?
Don't get left behind
Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.
Stay Connected with iSOS
Copyright: © 2026 iSOS. All Rights Reserved.
What We Do
Tech Solutions for Tomorrow
Web Development
Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.
Read MoreClaris Databases
With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.
Read MoremacOS & Windows Support
We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.
Read MoreReady to Elevate Your Digital Presence?
Don't get left behind
Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.
Stay Connected with iSOS
Copyright: © 2026 iSOS. All Rights Reserved.