Add to compare

ICO websiteWhite paper

LevelNet ICO details

Start Date: 2018-5-25

End date: 2018-6-1

    • Category: Big Data, Platform, Software
    • Token: LVL
    • Platform: Ethereum
    • Type: Utility
    • Initial price: 1 LVL = 0.01 USD
    • Bonus: Token Bonus by Collected Amount: 0 - $1.5m 10% $1.5m - $5m 7% $5m - $7m 5% $7m - $12m 3% Token Bonus by Time: First week 10% WhiteList Bonus: Whitelist members 15%
    • Accepting: BTC ETH Fiat LTC
    • Soft cap: 1.5M USD
    • Hard cap: 12M USD

LevelNet – New Endpoint Security Protocol: One for All & All for One

LevelNet integrates virtually all existing anti-virus technologies into one simple, user-friendly application. This distributed system enables participants to share threat data globally and in real time, allowing for the entire system to become much smarter, much faster, than any single security cybersecurity provider can today. LevelNet signi cantly boosts the capabilities of any user installed anti-virus program. If a user does not have any security applications installed, LevelNet can take advantage of its distributed network platform and act as a self-standing application.

Today’s cybersecurity solutions are limited. As one of the main providers nds a threat, it will often take signi cant time for that knowledge to be distributed to the total system. New malware takes advantage of this window of time to infect the greatest number of devices. LevelNet creates an integrated, global, and immediately responsive system to stop more malware earlier than it was heretofore possible.

The Problem: A World of Outdated Cybersecurity Solutions

The 2017 Global Cybersecurity market is valued at more than $400 billion1 , with the consumer antivirus segment alone valued at $25 billion. Usage of the internet is becoming ever more omnipresent, with markets such as IoT are driving ever more connectivity. Growth in the cybersecurity sector is significant and sustained, with an estimated CAGR (Compound Annual Growth Rate) of 9.5% between 2016 and 20212 . Such a high-value market coupled with sustained growth is ideal for investors looking for a lucrative value proposition.

The main opportunities in the consumer cybersecurity marketplace reside in the weaknesses created by an industry focused on existing threats, not future malware. Cybercrime evolves rapidly, and any system designed to face this threat must be designed to evolve rapidly. However, the monolithic nature of institutions tasked with this problem makes it difficult for them to offer the flexibility needed to surmount these challenges both quickly and efficiently.

An Emphasis on Future Threats

Traditional methods of virus protection rely on users installing anti-virus software. It searches and identifies malware using a database of signatures the provider has to compare to.

Files with executable code are analyzed, and their threat level is determined using a heuristic analysis method. These heuristic decisions are made using a previously developed algorithm, which is frequently left lagging in updates. Standard signatures are not used with the heuristic method.

A more advanced method of protection is code emulation. Here a virtual machine (VM) simulates the CPU and memory management systems then it executes the code on the VM in order to look for unintended or unaccounted for effects. This enables one to test and observe the effects of malicious code without making the non-virtual machine vulnerable. Additionally, with behavioral analysis technology, one can evaluate entire sequences of actions from the malware, thereby significantly increasing the efficiency of the anti-virus software.

These measures may be sufficient for prevention of known cyber-threats, but they are are not adequate for emerging malware. Virus protection often requires prompt and regular, regardless of particular software capabilities or which method they employ. Otherwise, the risk of security breaches increases significantly.

High Costs for Consumers

The cost to consumers is usually in the range of $50+ per year, with relatively low threat detection efficacy. No individual anti-virus product can offer “ideal protection.” Vendors specialize in a particular threat type, and enterprise solutions involve much more resource intensive processes such as emulation that are too expensive and time consuming for the consumer market. The average Industry-leading detection rates for anti-virus companies today are not more than 95% reactively and 80% proactively:


Other statistics are even less encouraging:

  • “The best antivirus software catches only 5% of new online threats” – by Harvard Business Review “
  • The Antivirus industry has a dirty little secret that they really don’t want anyone to know. Despite the claims of their marketing departments, their products are not all that effective in the real world. Best performances in the industry are between 80% and 90% against threats out there in the wild at any time, and their protection against ransomware is very bad”
  • “One well known, major antivirus industry player is routinely scoring no better than 80% reactive combined with a 70% proactive”

Scheme of checking data incoming from LevelNet network nodes

At the same time, Cyber-security does not come cheap – a typical Kaspersky Labs, NOD32, or Symantec product cost around $50 annually. LevelNet plans to offer a $0.99 annual cost for its premium service. Companies today spend upwards of 25% of their IT budget on Cyber-security. The market is hungry for solutions that can improve quality and lower the cost footprint.


How it Works

The LevelNet system provides cybersecurity measures against suspected files/viruses/threats detected by any of the anti-virus/cybersecurity software applications present on the LevelNet network. Suspicious files, viruses, and threats can be quarantined/deleted regardless of whether there is installed antivirus software at the particular endpoint.

It is essentially a network where each user exchanges information about IT security incidents (viruses and any other computer threats) detected on their device with other users in real time. This above process is done to prevent an attack directed at any device connected to the network. Network users agree to exchange such information beforehand.

Threat detection is performed by monitoring the response of security systems installed on the user’s device. The response is analyzed by the client programs that are located both on the user device and outside of it on other nodes of the network. After the analysis is completed, users are notified of the threat. Users receive threat notifications in the form of prepared bundles of information with various network protocols in place.

The source of the notification can be either the user device with an installed client program or other network nodes carrying functional features of the program responsible for notifications. The client program then blocks the threat for all notified users via specialized program features, i.e., alerts, other features then scan for the sources of the various threats.

8.1 Total Score

Add your review


Pavel Shkliaev


Alex Bodiagin


Anton Aksenov


Arthur Eolyan


Ivan Krivonos

Software Engineer

Alexey Kudryavtsev

Software Engineer

Alexander Volkov

Software Engineer

Andrey Baranovich

Security Engineer

Goshko Stanislav

Security Engineer

Boris Solovyev

Software Engineer

Anton Leshchenko

Software Engineer

Ivan Novikov

Traffic and Data analysis

Aleksandr Fedotov


Andrew Patsora

Project Manager

Stepan Mitryashkin

Community manager

Xenia Kissinger

Community manager

Konstantin Kosenkov

Software Engineer

Anton Rebkin

Community Manager

LevelNet Advisors

Dave Anderson

Former Director Solutions Marketing McAfee, Voltage Security

Nick Bilogorskiy

Sr. Director, Threat Operations at Cyphort, ex. Chief Malware Expert @ Facebook

Daniel Fadeev

Marketing and Data Analyst

Tatiana Abgarian

Corporate Counsel

Sergei Sergeenko

CEO Chronobank

Mikhail Savchenko



Q1 2018
Finalized Specification for the development. Visiting exhibitions, interacting with the community.Conclusion of cooperation agreements with representatives of the industry. Token Sale (LVL). Start of marketing campaign.
Q2 2018
Hire engineers and start back-end development process. Business development to promote the product among corporate users. Token Listing at Exchanges. Marketing campaign сontinued.
Q3 2018
Close of Alpha Version Corporate API. First сlosed testing. Business development to attract small anti-virus companies to cooperation. Preparing for the second phase of token sales (LVLS). Support and marketing for token holders (LVL).
Q4 2018
Start of mobile development. The first integration into existing antivirus products. Exchange of LVL stock tokens for LVLS. Electing the Board member from among LVLS token holders.
Q1 2019
Open Beta Version. SDK for integration in existing antivirus products. Presenting an industrial crypto index based on capitalization and other metrics. Sales of tokens (LVLS). Launching a new marketing campaign.
Q2 2019
Release candidate. RTM. Index listing on crypto exchanges. Support and marketing for token holders (LVLS and LVL). Marketing campaign continued.

Get the Best ICO's in your inbox

Don't worry we don't spam

We will be happy to hear your thoughts

      Leave a reply

      Your total score

      Register New Account
      Reset Password
      Compare items
      • Total (0)