Feature Review: Asset and User Illumination

With version 3.4, BluVector has introduced asset and user illumination, which allows BluVector sensors to integrate with an organization’s on-premises Active
Read More

Solution Guide: BluVector® Cortex™ Integration with CrowdStrike

BluVector Cortex is an AI-driven sense and response network security platform designed to accurately and efficiently detect, analyze and contain sophisticated
Read More

Solution Guide: BluVector and Carbon Black

BluVector® Cortex™ is an AI-driven sense and response network security platform designed to accurately and efficiently detect, analyze and contain sophisticated
Read More

Feature Brief: Fileless Malware Detection

Fileless malware, also called the invisible threat, is particularly hard to detect because it resides in system RAM and exploits
Read More

Financial Case Study: International Bank of Commerce Detects Jaff Malware

In 2017, IBC faced a new zero-day ransomware threat known as Jaff. The high-volume phishing malware, which affects Windows machines,
Read More

Infographic: Top Security Threats in 2018

Companies are under attack and cybersecurity professionals face the challenging task of protecting their businesses from every possible attack type in
Read More

Splunk Solution Guide

Together with Splunk, the BluVector® Cortex™ solution seamlessly combines automated threat detection and response with complete Operational Intelligence, solving the problem of advanced
Read More

Endace Solution Guide: Combining AI With Full Network Visibility

Combining BluVector and Endace gives analysts a platform that detects even the most advanced threats in real time and provides
Read More

Infographic: Evolving Network Security 2018

Network intrusion detection serves several different functions in today’s network security strategy. Yet, many detection solutions fail to keep pace
Read More

Infographic: Network & IoT Security in 2018

Feel like you’re behind on your IoT security goals? You’re not alone. While nearly every global technology security decision maker
Read More