
About defendexe
defendexe is a pioneering company in the cyber sovereignty line of business and the first spin-off of Princess Sumaya University for Technology (PSUT). By unifying AI-driven intelligence, blockchain integrity, and post-quantum cryptography, we deliver innovative security solutions that empower organizations to own and control their security posture entirely.
Secure
Enterprise-grade security
Intelligent
AI-driven solutions
Trusted
Digital trust platform
Decentralized documents & verification
VerifyX
The new generation of digital signing and verification—eliminating the risks of centralized trust authorities. Decentralized architecture and blockchain enable seamless, fraud-proof digital credentialing across industries and borders. For all organizations requiring cryptographic tamper-proof documents: educational, health, financial, and governmental sectors.
Decentralized Verification
Fraud-proof digital credentialing
Multi-Format Signing
Advanced signatures across formats
Verification
Independent verification
Hybrid Identity
Identity control in your hands
National threat intelligence & AI-driven analysis
Unified Threat Intelligence Platform
A national threat intelligence hub that aggregates global and local IoCs, exchanges and validates them using blockchain, and applies modern AI to correlate IoCs with organizational context—delivering accurate, contextual reactive and proactive insights and remediations. For NCSCs, critical infrastructures, and industrial control systems.
IOC Aggregation
National threat intelligence hub
AI Analysis
Context-aware threat intelligence
Blockchain
Immutable secure sharing
Real-time
Context-aware response
End-to-end zero trust security
360 Zero Trust
A secure gateway that continuously verifies every user, device, and request while enforcing strict access controls, adaptive trust scoring, and real-time policy enforcement. Tamper-resistant trust architecture across on-premise, cloud, and third-party environments. Ideal for critical infrastructure (energy, water, utilities) and control of OT and critical systems.
Users
Identity verification and user access control
Devices
Device health monitoring and compliance
Applications
Application-level security and governance
Systems
On-premise, cloud, and third-party