64TEQ

Intrusion Detection

Our AI-enabled IDS/IPS detects file-based and file-less malware. It uses supervised learning and patented algorithms to detect malware with an accuracy of 99% "out of the box."

Features

  • AI-powered malware detection
  • Targetted logging for rapid event correlation
  • In situ learning
  • Open standards, API-based framework for rapid integration into security environment
  • Multiple analyzers, including BRO, YARA, Clam A/V
  • Supports open and proprietary threat intelligence feeds

Benefits

  • Probability of detection of less than 1% s
  • In situ learning trains the algorithms for their specific environments
  • AI automates event correlation with rich analytics
  • Enables network perimeter defense against zero-day threats

Pricing

£10000 to £500000 per unit per year

Service documents

Framework

G-Cloud 11

Service ID

7 6 1 5 8 3 7 1 7 6 9 9 7 3 8

Contact

64TEQ

Michelle Nayee

02038580264

michelle.nayee@64teq.com

Service scope

Service constraints
For cloud deployments we require a virtual tap of network data.
System requirements
  • We require a tap or span port access
  • ESXi required for VM deployments

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our SLAs vary with client and level of responsiveness they require. Level 1 is typically immediately, Level 3 within 12 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We have a built in "Dial BluVector" link on our U/I that provides direct access to our troubleshooters.
Web chat accessibility testing
We have not yet completed chat testing for assistive technology users.
Onsite support
Onsite support
Support levels
We tailor support levels to the user requirements. Costs vary from client to client. We do assign a technical account manager for each client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide onsite and online training. We offer detailed user guides that are tailored to the users use cases.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We support government clients who typically key the appliance (and their data) at the end of the contract.
End-of-contract process
Full use of the appliance, regular updates/patch (no additional cost). The training requirements are minimal and typically offered at no cost.

Using the service

Web browser interface
Yes
Using the web interface
Using API/REST(ful) API, we offer end users the ability to maek browser-based changes and set-ups.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The web interface is available through a server or desk top browser.
Web interface accessibility testing
Regretfully, none. But we would welcome an opportunity to do so.
API
Yes
What users can and can't do using the API
Service/service calls and configuration changes can be made through server or client based browsers.
API automation tools
  • Ansible
  • OpenStack
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • ODF
  • PDF
Command line interface
Yes
Command line interface compatibility
Linux or Unix
Using the command line interface
Configuration and Integration services can be done through command line interface.

Scaling

Scaling available
No
Independence of resources
We support on an aggregated throughput basis. We typically size our appliance as a function of sustained throughput. Our clients typically want 20-25% excess capacity available. If capacity starts approaching 90% of max throughput we would simply add another appliance (and load balancer) in the network. That process (to install another appliance for scaling purposes) typically takes 60 mins or less.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • Other

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • HTTP request and response status
  • Memory
  • Network
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Installation, troubleshooting, training, and patching updates

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
All files and VMs
Backup controls
Users have the ability to tailor back up process per their priorities.
Datacentre setup
Single datacentre
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our SLAs are with the US government and they vary from client to client. We do guarantee "5 9's" availability and work with clients individually on their SLA requirements.
Approach to resilience
We do not operate a data center. Our appliance is deployed to our clients network or their virtual cloud.
Outage reporting
Thought all of the above - a central management function/GUI acts as a public dashboard. In case of outages, or warnings, APIs, emails, SMS are sent the appropriate people.

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Through multi factor authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication
Devices users manage the service through
Dedicated device on a government network (for example PSN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our standards are shareable upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available upon request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available upon request.
Incident management type
Supplier-defined controls
Incident management approach
Available upon request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Pricing

Price
£10000 to £500000 per unit per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Up to six months free to test VM or appliance based versions.
Link to free trial
Www.bluvector.io

Service documents

Return to top ↑