


Defensive Security
Computer and Network Security • Wilkowice, Silesian Voivodeship, Poland • 1-10 Employees
Company overview
| Headquarters | Kamienna, 1e, Bielsko Biała, Silesia 43-365, PL |
| Phone number | +48202141773 |
| Website | |
| NAICS | 518210 |
| SIC | 738 |
| Keywords | Active Directory, Network Security, Open Source, Penetration Testing, Siem, Incident Response, Security Analytics, Endpoint Security, Web Application Security, Cyber Security Training, Red Teaming, APT, Security Operation Center, Threat Analysis, Infrastructure Security, Threat Hunting, Memory Forensics, Linux Security, Dfir, Log Analysis, Devsecops, Cyber Range, It Security Consulting, Adversary Emulation, Purple Teaming, Blue Teaming, Attack Framework, C2 Matrix, Linux Hardening, Purplelabs, Sigma Rules, Sysmon |
| Founded | 2015 |
| Employees | 1-10 |
| Socials |
Key Contact at Defensive Security
Leszek Mis
Founder | Trainer | Principal Cyber Security Threat Expert
Defensive Security Email Formats
Defensive Security uses 2 email formats. The most common is {first initial}.{last name} (e.g., j.doe@defensive-security.com), used 66.7% of the time.
| Format | Example | Percentage |
|---|---|---|
{first initial}.{last name} | j.doe@defensive-security.com | 66.7% |
{first name}.{last name} | john.doe@defensive-security.com | 33.3% |
About Defensive Security
Defensive Security delivers high-quality cyber security services including Linux / Windows digital forensics, incident response, latest threat analysis, and hunting, penetration testing, and infrastructure hardening. We successfully deliver a combination of Threat/Adversary Emulations vs network/endpoint investigations and log analysis at scale which is known as Purple Teaming. Defensive Security offers advanced, hands-on cyber security training programs backed by PurpleLabs - a fully customized Cyber Range Environment enriched by step-by-step offensive/defensive lab instructions. Want to sharpen your Purple team skills? Try PurpleLabs where you will be playing with chained attack paths, emulating attacker's TTPs, and running detection/response at the same time by using Sysmon and EVTX, Auditd, Wazuh, Graylog, HELK, ElastAlert, Falco, OSQuery, Velociraptor, Zeek, Suricata, Moloch FPC, Volatility Framework, theHive, MISP, and Sigma Rules. Our mission is to help organizations have more secure infrastructures, better utilize Open Source software in Security Operations, and enable businesses to improve the detection capacity and skills of their SOC/IR teams. We are trusted by the biggest customers from the private, oil and gas, insurance, and financial sector. It was an honor for us to conduct training workshops during the biggest conferences including Hack In The Box, BruCON, 44CON, OWASP AppSec US, and Black Hat US. Our almost 20 years of hands-on experience with Open Source Security Solutions go directly into the full spectrum of technology solutions to support customers achieving better visibility and detections, improving offensive and defensive Red / Blue and Purple team skills, validating defensive technology stacks, and helping understand the value of the Assume Breach approach and emulation of threats after getting initial access (C2, post-exploitation, Lateral Movement, Persistence, Evasion).
Defensive Security revenue & valuation
| Annual revenue | $342,220 |
| Revenue per employee | $86,000 |
| Estimated valuation?This valuation is estimated based on industry average for the Computer and Network Security industry and current estimated revenues | $1,100,000 |
| Total funding | No funding |
Employees by Management Level
Total employees: 1-10
Seniority
Employees
Funding Data
Defensive Security has never raised funding before.
Defensive Security Tech Stack
Discover the technologies and tools that power Defensive Security's digital infrastructure, from frameworks to analytics platforms.
JavaScript graphics
Miscellaneous
Tag managers
JavaScript libraries
Reverse proxies
Security
Miscellaneous
Miscellaneous
Analytics
Miscellaneous
Font scripts
Frequently asked questions
4.8
40,000 users



