OVERVIEW

BlueCom’s patent pending technology allows for Enterprise-Class Secure Communication between any two Bluetooth Low Energy (BLE) devices using iBeacon technology. BlueCom’s platform enables secure communications over this unsecured channel by using advanced tokenization technology. All data is converted to pseudo-random tokens, making any attempts at tapping or spoofing irrelevant.

Beyond our patent pending tokenization technology, BlueCom’s platform includes 17 different tools and layers of security to deal with all existing types of information tampering.

INCLUDES PROTECTION FROM THE FOLLOWING TYPES OF CYBER ATTACKS

Tokens collected are meaningless to 3rd party attackers

Tokens created by illegal entities are blocked at the source

Fake tokens are rejected with no reply

The system rejects attempts to copy & reuse valid tokens

The system blocks both local and remote man-in-the-middle attacks

THE PROBLEM

Bluetooth technology was designed for short range communications with little to no security in mind and was not originally intended for secure enterprise solutions. There are dozens of free apps that allow any mobile phone to hack into your Bluetooth connection and manipulate your organization, your users or both.

BLUECOM SIEM

Monitor, Prevent, protect

BlueCom’s platform includes a full SIEM system which allows preventive monitoring of any attacks and suspicious activity.

The system combines analysis of both single sensor activity as well as overall network activity and attack patterns.

BlueCom’s SIEM allows blacklisting of device MAC addresses as well as creating specific scripts to deal with different attack vectors.

See how BlueCom can boost your
banking app capablities

Define & Activate Security Rules

BlueCom’s platform allows banks and enterprise’s to define their own security requirements creating advanced rules for activation of various services. Our platform supports any combination of the following variable states, in any combination:

Phone state

dark screen (phone in pocket) / active


Lock state

phone locked / unlocked


App state

app open / background / closed


Login

login required / not required


Activation

proactive (user presses button) / reactive (no action required)


Distance

define activation distance – touch (zero meters) to 20 meter distance

Combining Biometrics & Creating Hybrid Scenarios

BlueCom’s platform allows banks and other enterprise’s define to leverage biometrics and other forms of authentication to verify the legitimate user is in possession of the phone including:

Requiring PIN / Password


Using phone’s built in Fingerprint / Iris / Face unlock


Sending biometrics to cloud based 3rd party biometrics service

BlueCom platform support advanced hybrid scripts for instance:
Requiring different authentication from different groups


Prompting biometric identification at a distance


Enhancing requirements based on value of operation etc.

See how BlueCom can boost your
banking app capablities