Free — No signup required

Get your Cyber Defense Score™

See exactly what cyber insurance underwriters see when they scan your business. 100 tools. 60 seconds. No installation.

3 of 4 carriers run their own external scan during underwriting. Run yours first.

External scan only — we never access your systems. Based solely on publicly available data.

What Underwriters Check

The same 6 categories carriers scan during underwriting

41% of cyber insurance applications are denied. Most denials happen because businesses don't know what carriers are checking.

Email Authentication

SPF, DKIM, DMARC — the #1 underwriting requirement for BEC prevention.

Encryption (TLS/SSL)

Certificate validity, protocol version, cipher strength — carriers verify this.

Security Headers

HSTS, CSP, X-Frame-Options — indicators of security maturity.

DNS Security

DNSSEC, CAA records, dangling records — attack surface indicators.

Open Ports & Services

Exposed services, default ports, unnecessary attack surface.

Known Vulnerabilities

Outdated software, CVEs, and configurations that carriers flag.

How It Works

Three steps to insurance readiness

1

Enter your domain

Type your business website. No signup, no installation, no agents to deploy.

2

We scan externally

100 tools scan your external attack surface in 60 seconds — the same view carriers have.

3

Get your score

Receive your Cyber Defense Score™ mapped to what underwriters actually require.

Why This Matters

Know your posture before carriers do

41%

of cyber insurance applications denied on first submission

3/4

carriers run their own external scan during underwriting

96%

of carriers require enforced MFA evidence

20-40%

lower premiums for businesses with demonstrated controls

FAQ

Frequently asked questions

Is this really free?

Yes. The Cyber Defense Score™ is free with no signup required. We offer paid plans for continuous monitoring, trust pages, and questionnaire automation.

Do you access my systems?

No. This is an external-only scan based on publicly available data — the same view that cyber insurance carriers have. We never log into, probe, or access your internal systems.

What do you scan?

We check 100+ external signals: email authentication (SPF/DKIM/DMARC), TLS/SSL configuration, HTTP security headers, DNS records, open ports, and known vulnerabilities. These are the exact controls cyber insurers verify during underwriting.

How is this different from a penetration test?

A penetration test actively exploits vulnerabilities. We passively scan your external attack surface — no exploitation, no intrusion. Think of it as a pre-flight check before your carrier does their own assessment.

Will this help me get cyber insurance?

Yes. By identifying gaps before you apply, you can remediate issues and apply from a position of strength. Businesses that prepare with evidence-based scanning have significantly higher approval rates and lower premiums.