Mideye Shield
Block automated attacks before they reach your authentication system.
Risk-based scoring that stops credential stuffing, password spray, and brute force attacks. Collective intelligence from every deployment.
The challenge
Block lists go stale
Attackers rotate through IPs faster than any feed can update
Manual rules don't scale
Managing block lists and firewall rules manually takes time and leads to mistakes
Attack data stays local
What you learn from an attack doesn't help anyone else — and vice versa
Shield's approach
Collaborative
Attack data from all Shield deployments feeds into a shared threat intelligence network. An IP flagged at one customer raises the score for everyone.
Adaptive
Scores adjust based on observed behaviour. Recent activity weighs more than old activity. The system learns from what's happening now, not last week.
Curated
No block lists to maintain. No rules to configure. Shield returns a risk score (0-100) on every request. Your system decides what to do with it.
Technical specifications
Collaborative IP-centric threat intelligence for authentication systems
The network effect
When one customer is attacked, everyone learns. Instantly.
Day-one protection
Shield launches with a warm intelligence engine, drawing from aggregated, anonymized production data across multiple Nordic enterprises. No cold start. Immediate protection against real-world threats.
Integration
REST API
Query the fraud score for any IP with a simple HTTP call. Ingest authentication events to feed the network. Works with any language or platform.
RADIUS Backend
Integrates directly as a RADIUS backend module. No changes to existing authentication infrastructure. Inline protection for VPN, Wi-Fi, and network access.
RADIUS → Shield → Allow / Challenge / Block
Why authentication-specific?
Shield focuses on authentication and access flows — credential stuffing, password spray, brute force. Different tools serve different purposes.
"I have a WAF"
WAFs protect web traffic. Shield protects authentication flows specifically, detecting patterns in login attempts that WAFs aren't designed to catch.
"I use IP reputation lists"
IP reputation flags known bad actors. Shield detects novel attacks and shares intelligence in real-time, including attacks from previously unknown IPs.
"I have MFA"
MFA prevents successful account takeover but doesn't stop credential stuffing attempts. Shield blocks the attempts before they reach your authentication system.
"We don't see many attacks"
You might not know. Most authentication attacks are silent. Shield gives visibility into what's actually hitting your login endpoints.
Collaborative. Adaptive. Curated.
Supports threat intelligence sharing practices aligned with DORA Article 45 and NIS2 requirements.