How team.blue Automated Brand Protection Across 60+ Brands
From 50% Manual Work to 50% More Time

Summary: team.blue is a European digital-services group (domains, hosting, email, cloud, and adjacent tools) serving ~3.3M SMB customers through 60+ brands across 22 countries, with 3,600+ employees. You’ll recognize some of their brands like: Combell, TransIP, LCN.com, Shoptet, and more.
Challenge
Multiple brands across geos: With ~60 brands in 22 European countries, their fast-growing portfolio experienced campaigns surge, pause, and reappear.
Costly and slow manual takedowns: Security team members spent up to 50% of their time in remediation of phishing campaigns targeting team.blue.
“My Monday mornings were spent sending takedown emails, hoping they get actioned; it’s not the most exciting way to start your work week.” —Emil Stahl, Security Lead
Brand and support impact: Ticket spikes and negative public reviews increased when victims associated losses with team.blue’s brands. An increase in Denmark targeted attacks increased consumer liability (the first case was ~USD $1,200 equivalent), amplifying frustration and reputational risk.
“The nature of our business is security, and trust is really important with our customers, being able to get in front of that and ensure they can feel safe with no concerns is really important to us.” —Shelby Torrence, Marketing Director
Inconsistent internal reporting: Across countries and brands, some teams are highly targeted and savvy; others are hit only a few times a year and unaware of the right reporting path.
Slow response to threats: team.blue teams were unable to disrupt threats fast enough, recognizing that the value of disruption is directly tied to the speed at which an attack is addressed.
Customer overview
Industry
Digital Services and Software (SaaS)
Headquarters
Belgium
Company Size
100–200 employees
Use Cases
Phishing URLs, phishing mail campaigns, and malicious hosted content
Netcraft Product Features
Automated Takedowns, Centralized Reporting Portal, API, and Slack Workflow Integrations.
Solution
Group-wide rollout of Netcraft takedown & disruption:
Coverage for all brands.
Easy reporting via portal and API (including forwarding phishing emails).
Operational integration:
Creation of an internal #phishing channel to funnel threat campaigns and intelligence.
Developer-built tooling that flags spikes and enables one-click reports to Netcraft’s API.
“Now we can open Netcraft on a Monday and see that phishing logs started for a phishing attack reported by a customer on Saturday night. Before, we just had the data, but now we can use that data to be more proactive to kill the phishing campaign before it reaches our customers.” —Emil Stahl, Security Lead
Provider leverage:
Netcraft’s strong relationships with registrar/hosting providers, including many that have direct integrations and kill-switches available.
Rapid browser blocking as an initial disruption mechanism.
“We recognize that some hosts will ignore everyone’s requests, which isn’t on Netcraft, but in most cases, Netcraft’s kill switches and relationships with providers and blocking with browsers happen really fast. It’s nice for us to know that when we report something, it gets actioned and addressed quickly.” —Emil Stahl, Security Lead
Enablement & customer education:
Brand-level FAQs (e.g., “report to phishing@…”) to route signals centrally.
Standardized, uniform reporting processes across all regions.

Key Results
Up to 50% reduction in individual time spent on manual takedowns for key security staff.
Group-wide coverage: Rollout across ~60 brands in 22 countries via a single service and API.
Impact
Timesavings: Security and ops teams focus on acquisitions and customer requests instead of chasing abuse. The burden of alerts on weekends is reduced.
Faster disruption: Incidents are addressed in the critical first hour, limiting spread and minimizing follow-on tickets.
Brand protection:
Fewer negative experiences escalate when campaigns are disrupted early.
Clearer messaging to customers on how to report suspicious emails.
Attacker displacement: Observed shift of attacker focus to a major competitor after Netcraft go-live.
Better signal utilization: More customer-reported phish ingested (thanks to FAQs and shared mailboxes) Turning ad-hoc data into actionable takedowns.
Why Netcraft?
Proven accuracy & low false positives: team.blue had long received Netcraft’s infrastructure abuse reports and knew the quality first-hand.
Speed via relationships & automation: Registrar/host APIs, kill-switches, and established contacts accelerate takedowns and browser blocks.
Scalable for Mergers & Acquisitions: For a business consistently taking on new brands, a single platform and process that onboards new brands quickly and uniformly is essential.
“It’s more like a partnership since we have the same interest in combating cybercrime.” —team.blue