iSOS Security

Is Your Business As Secure
As You Think?

Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.

ISO 27001 Aligned Cyber Essentials GDPR Compliant 25+ Years Experience

iSOS Security

Is Your Business As Secure
As You Think?

Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.

ISO 27001 Aligned Cyber Essentials GDPR Compliant 25+ Years Experience

iSOS Security

Is Your Business As Secure
As You Think?

Continuous security monitoring and vulnerability scanning from the team that understands your systems inside out.

ISO 27001 Aligned Cyber Essentials GDPR Compliant 25+ Years Experience

Choose Your Level of Protection

Every tier includes daily threat detection as standard. Pick the scope that fits your business.

Package 1

Shield

External protection

Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.

£99/month

6-month minimum

What's included

  • Comprehensive external vulnerability scan, run monthly
  • Daily checks for newly published exploits
  • Security score (A–F grade) in every report
  • SSL certificate expiry monitoring
  • We flag unexpected exposed services
  • Professional PDF report with remediation guidance
  • Immediate alerts for Critical/High findings
  • Trend tracking
  • Covers 1 website
Get Started
Package 3

Citadel

Complete coverage

Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.

£449/month

12-month minimum

Everything in Sentinel, plus

  • Weekly comprehensive scans
  • Weekly report covering scans and monitoring
  • Data breach and credential monitoring
  • Container and infrastructure security scanning
  • Email vulnerability summaries
  • Covers 5 websites
  • Priority email support (next business day)
Get Started
Enterprise

Enterprise

Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.

Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.

Get in Touch

Choose Your Level of Protection

Every tier includes daily threat detection as standard. Pick the scope that fits your business.

Package 1

Shield

External protection

Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.

£99/month

6-month minimum

What's included

  • Comprehensive external vulnerability scan, run monthly
  • Daily checks for newly published exploits
  • Security score (A–F grade) in every report
  • SSL certificate expiry monitoring
  • We flag unexpected exposed services
  • Professional PDF report with remediation guidance
  • Immediate alerts for Critical/High findings
  • Trend tracking
  • Covers 1 website
Get Started
Package 3

Citadel

Complete coverage

Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.

£449/month

12-month minimum

Everything in Sentinel, plus

  • Weekly comprehensive scans
  • Weekly report covering scans and monitoring
  • Data breach and credential monitoring
  • Container and infrastructure security scanning
  • Email vulnerability summaries
  • Covers 5 websites
  • Priority email support (next business day)
Get Started
Enterprise

Enterprise

Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.

Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.

Get in Touch

Choose Your Level of Protection

Every tier includes daily threat detection as standard. Pick the scope that fits your business.

Package 1

Shield

External protection

Monthly vulnerability scanning with daily checks for newly published exploits. We scan your website, flag what's exposed, and alert you immediately if anything critical is found, with a clear report and step-by-step remediation guidance.

£99/month

6-month minimum

What's included

  • Comprehensive external vulnerability scan, run monthly
  • Daily checks for newly published exploits
  • Security score (A–F grade) in every report
  • SSL certificate expiry monitoring
  • We flag unexpected exposed services
  • Professional PDF report with remediation guidance
  • Immediate alerts for Critical/High findings
  • Trend tracking
  • Covers 1 website
Get Started
Package 3

Citadel

Complete coverage

Everything in Sentinel, but with weekly vulnerability scanning instead of monthly. Broader coverage across up to 5 websites, weekly combined reports, and priority support for businesses that need more frequent scanning and faster response times.

£449/month

12-month minimum

Everything in Sentinel, plus

  • Weekly comprehensive scans
  • Weekly report covering scans and monitoring
  • Data breach and credential monitoring
  • Container and infrastructure security scanning
  • Email vulnerability summaries
  • Covers 5 websites
  • Priority email support (next business day)
Get Started
Enterprise

Enterprise

Security doesn't come in a box. Enterprise is for organisations that need more: more endpoints, more applications, more IPs, and reporting that maps directly to your compliance framework.

Custom website, server and device allowances. Custom scan frequency (daily available). Compliance-ready reporting (Cyber Essentials, ISO 27001, PCI DSS, GDPR). Dedicated support with agreed SLAs. Quarterly review meetings.

Get in Touch

Quick Comparison

Capability Shield Sentinel Citadel
External vulnerability scanning Monthly Monthly Weekly
Daily exploit checks
Websites tested 1 2 5
Server/device monitoring × 5 10
File tampering alerts ×
Malware & rootkit detection ×
CIS configuration checks ×
Data breach monitoring × ×
Report Monthly Monthly Weekly
Immediate Critical/High alerts
SSL monitoring + service detection
Email vulnerability summaries × ×
Container security scanning × ×

Quick Comparison

Capability Shield Sentinel Citadel
External vulnerability scanning Monthly Monthly Weekly
Daily exploit checks
Websites tested iA deeper scan of the website itself, testing for injection attacks, broken authentication, and security misconfigurations (OWASP Top 10). Separate from the server scan. 1 2 5
Server/device monitoring iWe install a lightweight security agent on your servers that watches for suspicious activity 24/7: file changes, malware, failed logins, configuration drift, and more. × 5 10
File tampering alerts iWe monitor critical files on your servers and alert you if anything is changed, added, or deleted unexpectedly. This catches attackers modifying system files, planting backdoors, or tampering with your application. ×
Malware and rootkit detection iWe scan your servers for hidden malicious software (malware) and rootkits, which are tools attackers use to maintain secret access to a system after breaking in. ×
CIS configuration checks iYour server settings are checked against the Centre for Internet Security benchmarks: industry-standard rules for how a server should be configured securely. ×
Data breach monitoring iWe check if your company's domain has appeared in any known data breaches, so you can act before stolen credentials are used against you. × ×
Report Monthly Monthly (scans + monitoring) Weekly (scans + monitoring)
Immediate Critical/High alerts
SSL monitoring + unexpected service detection
Email vulnerability summaries × ×
Container and infrastructure security scanning × ×

Quick Comparison

Capability Shield Sentinel Citadel
External vulnerability scanning Monthly Monthly Weekly
Daily exploit checks
Websites tested iA deeper scan of the website itself, testing for injection attacks, broken authentication, and security misconfigurations (OWASP Top 10). Separate from the server scan. 1 2 5
Server/device monitoring iWe install a lightweight security agent on your servers that watches for suspicious activity 24/7: file changes, malware, failed logins, configuration drift, and more. × 5 10
File tampering alerts iWe monitor critical files on your servers and alert you if anything is changed, added, or deleted unexpectedly. This catches attackers modifying system files, planting backdoors, or tampering with your application. ×
Malware and rootkit detection iWe scan your servers for hidden malicious software (malware) and rootkits, which are tools attackers use to maintain secret access to a system after breaking in. ×
CIS configuration checks iYour server settings are checked against the Centre for Internet Security benchmarks: industry-standard rules for how a server should be configured securely. ×
Data breach monitoring iWe check if your company's domain has appeared in any known data breaches, so you can act before stolen credentials are used against you. × ×
Report Monthly Monthly (scans + monitoring) Weekly (scans + monitoring)
Immediate Critical/High alerts
SSL monitoring + unexpected service detection
Email vulnerability summaries × ×
Container and infrastructure security scanning × ×

How We Compare

iSOS bundles scanning, server monitoring, and professional reporting as standard.

Scroll to see all →

Feature iSOS Intruder HostedScan Pentest-Tools
External vulnerability scanning
Daily checks for newly published exploits ×
Web application testing
Always-on agent-based device monitoring × × ×
Professional managed security report × × ×
Immediate Critical/High alerts ×
SSL certificate monitoring
Security score and trend tracking ×
Data breach monitoring × × ×
UK-based team × ×
Flat monthly pricing ×
Direct access to security professionals × × ×

Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.

How We Compare

Most competitors charge similar prices for scanning alone. iSOS bundles scanning, server monitoring, and professional reporting as standard.

Feature iSOS Intruder HostedScan Pentest-Tools
External vulnerability scanning
Daily checks for newly published exploits ×
Web application testing
Always-on agent-based device monitoring × × ×
Professional managed security report × × ×
Immediate Critical/High alerts ×
SSL certificate monitoring
Security score and trend tracking ×
Data breach monitoring × × ×
UK-based team × ×
Flat monthly pricing ×
Direct access to security professionals × × ×

Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.

How We Compare

Most competitors charge similar prices for scanning alone. iSOS bundles scanning, server monitoring, and professional reporting as standard.

Feature iSOS Intruder HostedScan Pentest-Tools
External vulnerability scanning
Daily checks for newly published exploits ×
Web application testing
Always-on agent-based device monitoring × × ×
Professional managed security report × × ×
Immediate Critical/High alerts ×
SSL certificate monitoring
Security score and trend tracking ×
Data breach monitoring × × ×
UK-based team × ×
Flat monthly pricing ×
Direct access to security professionals × × ×

Competitor features sourced from publicly listed pages, verified April 2026. Some features vary by tier or implementation.

We Don't Stop at the Alert

When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.

Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.

We Don't Stop at the Alert

When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.

Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.

We Don't Stop at the Alert

When a vulnerability is found, we contact you straight away. But people aren't just interested in a report. They want to know someone is going to jump on it. With your approval, our team can engage directly to remediate the issue, whether that means working on your server, alongside your IT company, or co-ordinating with your internal team. We see it through until it's sorted.

Remediation support is available as an additional engagement at agreed rates. Not included in the monthly packages above.

Under the Hood

For the technical decision-makers. Here's the depth of what our platform covers.

Network Scanning

  • Full TCP port scan + top 100 UDP
  • CVE matching against 75,000+ known vulnerabilities
  • Service fingerprinting and version detection
  • Misconfiguration detection
  • Shadow IT / unexpected service discovery

Web Application Testing

  • OWASP Top 10 automated assessment
  • SQL injection, XSS, command injection
  • Security header analysis (CSP, HSTS, etc.)
  • Authentication and session testing
  • Information disclosure checks

Daily Threat Detection

  • Template-based exploit scanning
  • Checks against newly published CVEs
  • Runs between comprehensive scans
  • Catches newly published exploits within 24 hours of disclosure

Server Monitoring

  • Critical file integrity monitoring
  • Rootkit and malware detection
  • Software vulnerability checks (CVE matching)
  • System activity and log analysis
  • CIS benchmark compliance checks

SSL/TLS and Email

  • Certificate chain validation
  • Protocol and cipher suite assessment
  • OCSP revocation checks
  • SPF, DKIM, and DMARC validation
  • Expiry alerts at 30/14/7 days

Container Security

  • Docker image vulnerability scanning
  • OS package CVE detection
  • Infrastructure-as-code misconfiguration checks
  • SBOM generation
  • Secret detection in container layers

Under the Hood

For the technical decision-makers. Here's the depth of what our platform covers.

Network Scanning

  • Full TCP port scan + top 100 UDP
  • CVE matching against 75,000+ known vulnerabilities
  • Service fingerprinting and version detection
  • Misconfiguration detection
  • Shadow IT / unexpected service discovery

Web Application Testing

  • OWASP Top 10 automated assessment
  • SQL injection, XSS, command injection
  • Security header analysis (CSP, HSTS, etc.)
  • Authentication and session testing
  • Information disclosure checks

Daily Threat Detection

  • Template-based exploit scanning
  • Checks against newly published CVEs
  • Runs between comprehensive scans
  • Catches newly published exploits within 24 hours of disclosure

Server Monitoring

  • Critical file integrity monitoring
  • Rootkit and malware detection
  • Software vulnerability checks (CVE matching)
  • System activity and log analysis
  • CIS benchmark compliance checks

SSL/TLS and Email

  • Certificate chain validation
  • Protocol and cipher suite assessment
  • OCSP revocation checks
  • SPF, DKIM, and DMARC validation
  • Expiry alerts at 30/14/7 days

Container Security

  • Docker image vulnerability scanning
  • OS package CVE detection
  • Infrastructure-as-code misconfiguration checks
  • SBOM generation
  • Secret detection in container layers

Under the Hood

For the technical decision-makers. Here's the depth of what our platform covers.

Network Scanning

  • Full TCP port scan + top 100 UDP
  • CVE matching against 75,000+ known vulnerabilities
  • Service fingerprinting and version detection
  • Misconfiguration detection
  • Shadow IT / unexpected service discovery

Web Application Testing

  • OWASP Top 10 automated assessment
  • SQL injection, XSS, command injection
  • Security header analysis (CSP, HSTS, etc.)
  • Authentication and session testing
  • Information disclosure checks

Daily Threat Detection

  • Template-based exploit scanning
  • Checks against newly published CVEs
  • Runs between comprehensive scans
  • Catches newly published exploits within 24 hours of disclosure

Server Monitoring

  • Critical file integrity monitoring
  • Rootkit and malware detection
  • Software vulnerability checks (CVE matching)
  • System activity and log analysis
  • CIS benchmark compliance checks

SSL/TLS and Email

  • Certificate chain validation
  • Protocol and cipher suite assessment
  • OCSP revocation checks
  • SPF, DKIM, and DMARC validation
  • Expiry alerts at 30/14/7 days

Container Security

  • Docker image vulnerability scanning
  • OS package CVE detection
  • Infrastructure-as-code misconfiguration checks
  • SBOM generation
  • Secret detection in container layers

Need Something More?

Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.

Grey-Box Testing

We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.

Get a Quote →

White-Box Testing

Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.

Get a Quote →

Need Something More?

Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.

Grey-Box Testing

We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.

Get a Quote →

White-Box Testing

Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.

Get a Quote →

Need Something More?

Our subscription packages cover automated external and internal testing. For deeper analysis, we offer custom engagements.

Grey-Box Testing

We test your application with partial knowledge of the internals, simulating a motivated attacker who's done their homework. Covers authentication flows, business logic, and privilege escalation.

Get a Quote →

White-Box Testing

Full source code review and application-level security audit. We analyse your codebase for vulnerabilities that automated scanning simply cannot find.

Get a Quote →
Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.