Blueliv

Materials Hack
Playground for innovative materials powered by Borealis.
8th-10th July – Vienna, Austria
2.5
days Hackathon
3
weeks Incubation
2
winning teams
24K
cash prizes
Blueliv

Claim instruction: 

  1. Send us an email to claim@startus.cc from an official Blueliv​ email account. The content must be:

    StartUs buddies, 

    Please, allow me to claim rights over Blueliv​

    Best regards,
    [your name]

  2. Once sent the email click the Claim Startup button.
  3. Our team will verify the origin account and will grant claim rights over the startup to the user if everything is ok.
Pallars 99, Office 17
08018 Barcelona Barcelona
Spain
General information: 

Blueliv is a leading provider of targeted cyber threat information and analysis intelligence for large enterprises, service providers and security vendors. The company’s deep expertise, data sources, and big data analysis capabilities enable the clients to protect against cyber attacks. Its turnkey cloud-based platform addresses a comprehensive range of cyber threats to turn global threat data into real-time actionable intelligence specifically for each client. 

Blueliv’s clients include leading bank, insurance, telecom, utility and retail enterprises, and the company has alliances with leading security vendors and other organizations to share cyber intelligence. 

In 2015 Blueliv has achieved “Cool Vendor” status in Gartner Communications Service Provider Security report. 

BOTNETS AND COMMAND & CONTROL 

Detect internal and external infections in computers, eliminate “blind spots”, retrieve compromised credentials and protect clients and employees and gain proactive and real-time awareness of crime servers. 

THREAT INTELLIGENCE FEED 

Get a flow of bidirectional, dynamic intelligence on live threats targeting your users and customers and quickly integrate it into your SIEM through a single point of contact (API). 

TARGETED MALWARE 

Detect targeted malware, prevent creation of dangerous or infected files in websites and servers and, gain early warnings of information theft or leaks due to a malware attack. 

CREDIT CARD THEFT 

Detect credit card information that has been stolen and protect customers and employees from becoming a fraud target. Compromised credit cards can be retrieved when they are published and sold on the deep Internet and black markets. 

MORE SOLUTIONS: 

Blueliv’s Cyber Threat Intelligence platform offers a wider range of solutions with the aim of improving your company’s security and protecting it from threats like Phishing, Brand Abuse or Mobile Malware. 

Company information: 
Company type: 
Startup
Industry: 
IT - Security, IT - Service, IT - Software Development
Products and Services: 
BOTNETS AND COMMAND & CONTROL
Product category: 
IT- Security

The Blueliv Botnets Module is designed to detect infections in your computers, retrieve compromised credentials, and protect your business and users from potential damage such as being part of a botnet network, data theft or other cyber threats. Use the Blueliv Botnets and C&C Module to:

  • Detect internal and external infections in critical servers, VIP users, and clients
  • Eliminate “blind spots” in your threat landscape
  • Protect clients and employees by recovering stolen user IDs and passwords
  • Gain proactive, real-time awareness of crime servers and the ability to track and block them

Blueliv delivers a list of infected host IPs, a list of compromised credentials, global crime server tracking, and graphical statistics. Our robust intelligence analytics provide you with valuable data for preventing or minimizing botnet threats, including:

  • Heat map of botnets with geolocation features
  • Data describing which systems are infected, how they were infected, and when they were infected
  • Analysis of the most-infected OS profiles, software, and users
TARGETED MALWARE
Product category: 
IT- Security

The Blueliv Malware Module detects and helps prevent creation of dangerous or infected files in your websites and servers. Use the malware module to:

  • Track malware and mobile malware trends—locally and globally—to detect targeted malware
  • Connect internal network analysis appliances to automatically send malicious binaries for analysis into a cloud-based elastic sandbox
  • Gain early warnings of information theft or leaks due to a malware attack

Blueliv delivers robust malware reports, giving you forensic understanding of malware behavior on targeted internal and external systems. Blueliv analyzes more than 50,000 malware samples a month that could affect your organization. With live malware threat data, you will know which systems are infected, how they were infected, and when they were infected. This live data can be streamed into your SIEM.

In addition, by uploading your suspicious executable files to our intelligent sandbox, we can deliver detailed analysis about behavior, system changes, network traffic, and malware distribution campaigns.

CREDIT CARD THEFT
Product category: 
IT- Security

This module helps you detect credit card information that has been stolen so that you can protect your customers or employees from becoming a fraud target. You can retrieve compromised credit cards when they are published and sold on the deep Internet and black markets. Use the Blueliv Carding Module to:

  • Create a proactive cyber security strategy and prevent credit card fraud
  • Block stolen credit cards, regardless of how they were compromised.
  • Harden your cyber security profile and drive attacks away
  • Protect your corporate cards and VIPs from non-authorized purchases
  • Reduce insurance costs due to control and credit card fraud mitigation

Blueliv delivers a real-time list of recovered credit cards and provides early warning in the event of VIP and corporate card theft. In addition, you can view a heatmap of credit card black markets and infected point-of-sale systems. With live carding threat data, you will know which systems are infected, how they were infected, and when they were infected. And you can use Blueliv’s compromised credit card information to feed your fraud scoring algorithms.

Pages

Contact:

Login or register to see the contact information!