Skip to content
defendexe

Digital Defence Excellence

By unifying AI-driven intelligence, blockchain integrity, and post-quantum cryptography, we deliver innovative security solutions that empower organizations to own and control their security posture entirely.

About defendexe

defendexe is a pioneering company in the cyber sovereignty line of business and the first spin-off of Princess Sumaya University for Technology (PSUT). By unifying AI-driven intelligence, blockchain integrity, and post-quantum cryptography, we deliver innovative security solutions that empower organizations to own and control their security posture entirely.

Secure

Enterprise-grade security

Cryptographic security
Data protection
Secure workflows

Intelligent

AI-driven solutions

AI-powered analysis
Smart automation
Intelligent insights

Trusted

Digital trust platform

Verifiable documents
Zero-trust architecture
Trusted operations

Decentralized documents & verification

VerifyX

The new generation of digital signing and verification—eliminating the risks of centralized trust authorities. Decentralized architecture and blockchain enable seamless, fraud-proof digital credentialing across industries and borders. For all organizations requiring cryptographic tamper-proof documents: educational, health, financial, and governmental sectors.

Decentralized Verification

Fraud-proof digital credentialing

Cross-organization verification
eIDAS 1.0 & 2.0 ready
Privacy compliance

Multi-Format Signing

Advanced signatures across formats

PDF, JSON, XML, Text
Single, parallel, sequential
Tamper-proof documents

Verification

Independent verification

Third-party validation
Legal validity
Trust verification

Hybrid Identity

Identity control in your hands

National PKI (SANAD) integration
Internal CA option
Flexible deployment

National threat intelligence & AI-driven analysis

Unified Threat Intelligence Platform

A national threat intelligence hub that aggregates global and local IoCs, exchanges and validates them using blockchain, and applies modern AI to correlate IoCs with organizational context—delivering accurate, contextual reactive and proactive insights and remediations. For NCSCs, critical infrastructures, and industrial control systems.

IOC Aggregation

National threat intelligence hub

Global & local IoCs
Exchange & validate via blockchain
Multi-source collection

AI Analysis

Context-aware threat intelligence

IOC matching & threat scoring
Mitigation recommendations
Proactive insights

Blockchain

Immutable secure sharing

Permissioned channels
Immutable records
Secure sharing

Real-time

Context-aware response

Reactive & proactive remediations
NCSC & critical infrastructure
ICS use cases

End-to-end zero trust security

360 Zero Trust

A secure gateway that continuously verifies every user, device, and request while enforcing strict access controls, adaptive trust scoring, and real-time policy enforcement. Tamper-resistant trust architecture across on-premise, cloud, and third-party environments. Ideal for critical infrastructure (energy, water, utilities) and control of OT and critical systems.

Users

Identity verification and user access control

Behavior classification & trust scoring
Adaptive trust
Identity verification

Devices

Device health monitoring and compliance

Device compliance checks
Health monitoring
Policy enforcement

Applications

Application-level security and governance

Access governance
Threat detection & risk profiling
Policy controls

Systems

On-premise, cloud, and third-party

Tamper-resistant trust backbone
OT & critical systems
End-to-end security