{"id":16,"date":"2026-04-16T07:40:36","date_gmt":"2026-04-16T06:40:36","guid":{"rendered":"https:\/\/dfendit.be\/?page_id=16"},"modified":"2026-04-16T17:10:43","modified_gmt":"2026-04-16T16:10:43","slug":"home","status":"publish","type":"page","link":"https:\/\/dfendit.be\/","title":{"rendered":"Home"},"content":{"rendered":"<h1><span style=\"color: #253c80;\">Securing tomorrow<\/span> today.<\/h1>\n<div>\n<h3>We\u2019re currently building something new. Stay tuned.<\/h3>\n<div>\n<p>At DFENDIT, we design and protect modern cloud environments with a security-first mindset. Our focus lies at the intersection of cloud and cybersecurity\u2014where architecture, identity, and resilience converge.<\/p>\n<p>We help organizations build secure, scalable foundations in the cloud, ensuring risks are managed without slowing innovation.<\/p>\n<p>From strategy to implementation, security is embedded by design\u2014not added as an afterthought.<\/p>\n<\/div>\n<\/div>\n<div>\n<h3>Security is no longer about boundaries.<\/h3>\n<p>It\u2019s about control, verification, and resilience<\/p>\n<div>\n<p data-start=\"441\" data-end=\"668\">From identity and access to network and workload protection, we embed security into every layer of your cloud architecture. The result is a secure, scalable foundation that supports innovation without exposing unnecessary risk.<\/p>\n<p data-start=\"670\" data-end=\"747\">Cloud security is <strong>complex<\/strong>. <\/p>\n<p data-start=\"670\" data-end=\"747\">We make it structured, enforceable, and effective.<\/p>\n<\/div>\n<\/div>\n<div>\n<h3>Contact.<\/h3>\n<div>\n<p><strong>Zero Trust<\/strong> starts here<br \/><a href=\"\/info@dfendit.be\">info@dfendit.be<\/a><\/p>\n<p>Security doesn\u2019t stop ~ neither do we<br \/><a href=\"\/support@dfendit.be\">support@dfendit.be<\/a><\/p>\n<\/div>\n<\/div>\n<h1>Why choose us.<\/h1>\n<div>\n<h2>Security-first mindset.<\/h2>\n<div>\n<p>Security is embedded in every decision\u2014not added later.<\/p>\n<\/div>\n<p><a href=\"#\"><\/a><\/p>\n<\/div>\n<div>\n<h2>Deep cloud expertise.<\/h2>\n<div>\n<p>Strong focus on Microsoft Azure and modern cloud architectures.<\/p>\n<\/div>\n<p><a href=\"#\"><\/a><\/p>\n<\/div>\n<div>\n<h2>Pragmatic approach.<\/h2>\n<div>\n<p>No buzzwords\u2014just implementable, effective security.<\/p>\n<\/div>\n<p><a href=\"#\"><\/a><\/p>\n<\/div>\n<div>\n<h2>Continuous protection.<\/h2>\n<div>\n<p>Monitoring, improvement, and adaptation to evolving threats.<\/p>\n<\/div>\n<p><a href=\"#\"><\/a><\/p>\n<\/div>\n<h1>Core Services.<\/h1>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"<span style=\\\"color: #253c80;\\\">Securing tomorrow<\/span> today.\",\"image_align\":\"left\",\"image_margin\":\"xsmall\",\"text_align\":\"right\",\"title_color\":\"secondary\",\"title_decoration\":\"bullet\",\"title_element\":\"h1\",\"title_text_stroke\":false}}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,1-3,1-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>At DFENDIT, we design and protect modern cloud environments with a security-first mindset. Our focus lies at the intersection of cloud and cybersecurity\u2014where architecture, identity, and resilience converge.<\/p>\n\n\\n\n\n<p>We help organizations build secure, scalable foundations in the cloud, ensuring risks are managed without slowing innovation.<\/p>\n\n\\n\n\n<p>From strategy to implementation, security is embedded by design\u2014not added as an afterthought.<\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title\":\"We\u2019re currently building something new. Stay tuned.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p data-start=\\\"441\\\" data-end=\\\"668\\\">From identity and access to network and workload protection, we embed security into every layer of your cloud architecture. The result is a secure, scalable foundation that supports innovation without exposing unnecessary risk.<\/p>\n\n\\n\n\n<p data-start=\\\"670\\\" data-end=\\\"747\\\">Cloud security is <strong>complex<\/strong>. <\/p>\n\n\\n\n\n<p data-start=\\\"670\\\" data-end=\\\"747\\\">We make it structured, enforceable, and effective.<\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"It\u2019s about control, verification, and resilience\",\"meta_align\":\"below-title\",\"meta_color\":\"warning\",\"meta_element\":\"div\",\"meta_style\":\"text-large\",\"panel_padding\":\"small\",\"panel_style\":\"card-primary\",\"title\":\"Security is no longer about boundaries.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p><strong>Zero Trust<\/strong> starts here<br \/><a href=\\\"info@dfendit.be\\\">info@dfendit.be<\/a><\/p>\n\n\\n\n\n<p>Security doesn\u2019t stop ~ neither do we<br \/><a href=\\\"support@dfendit.be\\\">support@dfendit.be<\/a><\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"small\",\"panel_style\":\"card-secondary\",\"title\":\"Contact.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding_bottom\":\"small\",\"padding_remove_horizontal\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"margin_bottom\":\"remove\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Why choose us.\",\"image_align\":\"left\",\"image_margin\":\"xsmall\",\"text_align\":\"right\",\"title_color\":\"primary\",\"title_decoration\":\"bullet\",\"title_element\":\"h1\",\"title_text_stroke\":false}}]}]}]},{\"name\":\"Why choose us\",\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"200\",\"header_transparent\":true,\"image\":\"wp-content\/uploads\/photo-1623018035782-b269248df916-scaled.jpg\",\"image_loading\":true,\"image_parallax_bgy\":\"0,500\",\"image_parallax_easing\":\"1\",\"image_position\":\"bottom-center\",\"image_size\":\"cover\",\"media_visibility\":\"xl\",\"padding_bottom\":\"small\",\"padding_top\":\"small\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\",\"width\":\"default\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Security is embedded in every decision\u2014not added later.<\/p>\n\n\",\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"content_margin_auto\":true,\"height_expand\":true,\"icon\":\"\",\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"#\",\"link_style\":\"primary\",\"link_text\":\"\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_link\":false,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Security-first mindset.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Strong focus on Microsoft Azure and modern cloud architectures.<\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"content_margin_auto\":true,\"height_expand\":true,\"icon\":\"\",\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"#\",\"link_style\":\"primary\",\"link_text\":\"\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"text_align\":\"center\",\"title\":\"Deep cloud expertise.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>No buzzwords\u2014just implementable, effective security.<\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"content_margin_auto\":true,\"height_expand\":true,\"icon\":\"\",\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"#\",\"link_style\":\"default\",\"link_text\":\"\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"text_align\":\"center\",\"title\":\"Pragmatic approach.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Monitoring, improvement, and adaptation to evolving threats.<\/p>\n\n\",\"content_column_breakpoint\":\"m\",\"content_margin_auto\":true,\"height_expand\":true,\"icon\":\"\",\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"link\":\"#\",\"link_style\":\"default\",\"link_text\":\"\",\"margin_bottom\":\"default\",\"margin_top\":\"default\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"default\",\"panel_style\":\"card-secondary\",\"text_align\":\"center\",\"title\":\"Continuous protection.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Core Services.\",\"image_align\":\"left\",\"image_margin\":\"xsmall\",\"text_align\":\"right\",\"title_color\":\"primary\",\"title_decoration\":\"bullet\",\"title_element\":\"h1\",\"title_text_stroke\":false}}]}]}]}],\"version\":\"5.0.28\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing tomorrow today. We\u2019re currently building something new. Stay tuned. At DFENDIT, we design and protect modern cloud environments with a security-first mindset. Our focus lies at the intersection of cloud and cybersecurity\u2014where architecture, identity, and resilience converge. We help organizations build secure, scalable foundations in the cloud, ensuring risks are managed without slowing innovation. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":63,"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":87,"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/pages\/16\/revisions\/87"}],"wp:attachment":[{"href":"https:\/\/dfendit.be\/index.php\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}