Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 15 August, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Outpost24 acquires threat intelligence provider Blueliv

Acquisition will create one of Europe's largest and advanced cyber threat landscape monitoring offering

by Rohit Chavda
July 14, 2021
in Editor's News
Share on FacebookShare on Twitter

Outpost24 has announced the acquisition of Blueliv, a leading cyber threat intelligence company from Spain.

This combination will create one of the largest cybersecurity providers in Europe and provide the most advanced threat landscape monitoring solution. The objective: to help businesses identify threats targeting their organizations and dramatically reduce risk exposure.

“It has been a difficult 18 months as many organizations struggled to mitigate the growing number of vulnerabilities and attacks coming from all directions, along with a lack of context about risk in relation to the external threat environment,” said Karl Thedéen, CEO of Outpost24. “Because of this, automated and continuous threat intelligence has become critical. The combined solution will empower our customers to accelerate risk reduction by giving them the threat context to prioritize remediation efforts and increase security efficiency like never before”.

Widely regarded as one of Europe’s leading cyber threat intelligence providers, Blueliv has built a trusted name within the security industry. Its pay-as-you-need modular architecture provides customers with streamlined, cost-effective intelligence delivered in real-time. Blueliv’s flagship product, the Threat Compass, is built from a customizable group of targeted intelligence modules which radically reduces attack success rates and improves incident response performance. The intelligence gathered from open, deep and dark web also helps power the Blueliv Threat Exchange Network, which is designed to encourage members to share news and indicators of compromise, and offer a live cyber threat map for tracking crimeservers and malicious IPs.

“As we both continue on our mission to help businesses and security teams become more efficient and secure, there are many similarities between Outpost24 and Blueliv which will make this acquisition ideal to provide our joint customers with a unique security offering,” said Daniel Solis, CEO & Founder of Blueliv. “By sharing our knowledge and combining our best-in-class threat intelligence with Outpost24’s full stack security assessment platform, we look forward to setting a new standard for threat landscape monitoring together.”

According to Gartner, “threat intelligence is evidence-based knowledge about existing or emerging menaces or hazards to assets. CISOs should plan for current threats, as well as those that could emerge in the long term.” With cybercriminals continually evolving their methods to exploit valuable and sensitive information from businesses, cyber threat intelligence has become an important pillar within an organization’s defense to help security teams protect against sophisticated attacks.

With the recent news of Microsoft acquiring RiskIQ, the demand for increased cybersecurity services is growing, especially with the rise of ransomware.

FacebookTweetLinkedIn
Tags: AcquisitionCybersecurity
ShareTweetShare
Previous Post

Top 5 features of a secure password reset solution

Next Post

Outpost24 acquires threat intelligence provider Blueliv

Recent News

Doctor holding phone

Recovery From NHS Attack Could Take Weeks

August 12, 2022
Industry All-Stars Take Stage at International Cyber Expo’s Global Cyber Summit

Industry All-Stars Take Stage at International Cyber Expo’s Global Cyber Summit

August 12, 2022
Laptop, phone, hands

Campaign Launched to Stop People From Becoming Money Mules

August 11, 2022
MIRACL is One Cybersecurity Company to Watch in 2022

MIRACL is One Cybersecurity Company to Watch in 2022

August 10, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information