Fully-managed cybersecurity operations specifically designed to protect all devices and data across your entire IT environment.
Explore More >U.S. security operations including threat hunting, forensic investigations, and rapid incident response.
Explore More >Prevent cybercriminals from running malware, disrupting operations, stealing sensitive data, encrypting files, or holding critical digital assets for ransom.
Explore More >Enhance your organization’s security with optional advanced services including Attack Surface Monitoring, Dark Web Monitoring and more.
Protect industrial and operational control systems from cyber attack.
Explore More >Learn how to stop attacks other solutions miss.
Learn how to stop attacks other solutions miss.
Learn how to stop attacks other solutions miss.
Learn how to stop attacks other solutions miss.
License Agreements
This End User Agreement (this “Agreement”, also referred to elsewhere as “EULA”) is a legal agreement between the entity entering into this Agreement and Blueshift Cybersecurity, Inc., a Delaware corporation (“Blueshift”). This Agreement governs orders placed by Customer (defined below) to access and use Blueshift’s On-Premise Software, Cloud Services and/or Professional Services (and any updates and modifications thereto).
BY ISSUING AN ORDER TO BLUESHIFT (OR ITS AUTHORIZED CHANNEL PARTNER) OR OTHERWISE USING OR ACCESSING THE PRODUCTS MADE AVAILABLE BY BLUESHIFT HEREUNDER, CUSTOMER AGREES TO FOLLOW AND BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU ARE AN INDIVIDUAL (“YOU”) ACTING ON BEHALF OF CUSTOMER, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO LEGALLY BIND CUSTOMER TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT HAVE AUTHORITY TO BIND CUSTOMER, OR IF YOU OR CUSTOMER DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU AND CUSTOMER MAY NOT USE THE PRODUCTS.
This Agreement consists of, collectively, this base agreement, the terms and conditions detailed in the Product Addendum attached hereto, and the applicable Policies. In the event of any conflict between the terms and conditions set forth in the base Agreement and those set forth in the Product Addendum, the terms and conditions of such Product Addendum shall control.
Whitelist Management and Blueshift Protect
Whitelisting is a cybersecurity technique whereby users can only take actions on their computer authorized by an administrator. Blueshift XDR’s Managed Whitelisting provides an optimal user experience in that functions and access are automatically limited to safe content. Blueshift Protect’s architecture utilizes elements from both architectures but implements an overall default-deny defense. Blueshift XDR’s implementation of managed whitelisting constantly monitors your system processes and blocks them at the endpoint until they’re validated.
Whitelist Management Related CMMC Domains:
Access Control (AC)
Audit and Accountability (AU)
Configuration Management (CM)
Media Protection (MP)
Risk Assessment (RM)
System and Information Integrity (SI)
EXHIBIT 1: PRODUCT ADDENDUM
Part 1: Additional Terms and Conditions Specific to Cloud Services
Part 2: Additional Terms and Conditions Specific to On-Premise Software
Updates and Upgrades. Blueshift may release patches, bug fixes, updates, upgrades, maintenance and/or service packs (“Updates”) for the On-Premise Software from time to time, which may be necessary to ensure the proper function and security of the Products. Blueshift is not responsible for performance, security, warranty breaches, support or issues encountered in connection with the Products that result from Customer’s failure to accept and apply Updates within a reasonable timeframe.