Intrusion Detection

Our AI-enabled IDS/IPS detects file-based and file-less malware. It uses supervised learning and patented algorithms to detect malware with an accuracy of 99% "out of the box."


  • AI-powered malware detection
  • Targetted logging for rapid event correlation
  • In situ learning
  • Open standards, API-based framework for rapid integration into security environment
  • Multiple analyzers, including BRO, YARA, Clam A/V
  • Supports open and proprietary threat intelligence feeds


  • Probability of detection of less than 1% s
  • In situ learning trains the algorithms for their specific environments
  • AI automates event correlation with rich analytics
  • Enables network perimeter defense against zero-day threats


£10000 to £500000 per unit per year

Service documents


G-Cloud 11

Service ID

7 6 1 5 8 3 7 1 7 6 9 9 7 3 8



Michelle Nayee



Service scope

Service scope
Service constraints For cloud deployments we require a virtual tap of network data.
System requirements
  • We require a tap or span port access
  • ESXi required for VM deployments

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our SLAs vary with client and level of responsiveness they require. Level 1 is typically immediately, Level 3 within 12 hours.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We have a built in "Dial BluVector" link on our U/I that provides direct access to our troubleshooters.
Web chat accessibility testing We have not yet completed chat testing for assistive technology users.
Onsite support Onsite support
Support levels We tailor support levels to the user requirements. Costs vary from client to client. We do assign a technical account manager for each client.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite and online training. We offer detailed user guides that are tailored to the users use cases.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction We support government clients who typically key the appliance (and their data) at the end of the contract.
End-of-contract process Full use of the appliance, regular updates/patch (no additional cost). The training requirements are minimal and typically offered at no cost.

Using the service

Using the service
Web browser interface Yes
Using the web interface Using API/REST(ful) API, we offer end users the ability to maek browser-based changes and set-ups.
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is available through a server or desk top browser.
Web interface accessibility testing Regretfully, none. But we would welcome an opportunity to do so.
What users can and can't do using the API Service/service calls and configuration changes can be made through server or client based browsers.
API automation tools
  • Ansible
  • OpenStack
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • ODF
  • PDF
Command line interface Yes
Command line interface compatibility Linux or Unix
Using the command line interface Configuration and Integration services can be done through command line interface.


Scaling available No
Independence of resources We support on an aggregated throughput basis. We typically size our appliance as a function of sustained throughput. Our clients typically want 20-25% excess capacity available. If capacity starts approaching 90% of max throughput we would simply add another appliance (and load balancer) in the network. That process (to install another appliance for scaling purposes) typically takes 60 mins or less.
Usage notifications Yes
Usage reporting
  • API
  • Email
  • Other


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • HTTP request and response status
  • Memory
  • Network
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Installation, troubleshooting, training, and patching updates

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up All files and VMs
Backup controls Users have the ability to tailor back up process per their priorities.
Datacentre setup Single datacentre
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Our SLAs are with the US government and they vary from client to client. We do guarantee "5 9's" availability and work with clients individually on their SLA requirements.
Approach to resilience We do not operate a data center. Our appliance is deployed to our clients network or their virtual cloud.
Outage reporting Thought all of the above - a central management function/GUI acts as a public dashboard. In case of outages, or warnings, APIs, emails, SMS are sent the appropriate people.

Identity and authentication

Identity and authentication
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels Through multi factor authentication.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication
Devices users manage the service through Dedicated device on a government network (for example PSN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our standards are shareable upon request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Available upon request.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Available upon request.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Available upon request.
Incident management type Supplier-defined controls
Incident management approach Available upon request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No


Price £10000 to £500000 per unit per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Up to six months free to test VM or appliance based versions.
Link to free trial Www.bluvector.io

Service documents

Return to top ↑