Menu

Company Profile

Vectra® Networks automates the hunt for hidden cyber attacks inside campus networks, data centers and the cloud by continuously monitoring internal traffic to detect active threats as they are happening. Vectra automatically correlates threats with host devices that are under attack, provides unique context about what attackers are doing, and prioritizes threats that pose the biggest risk. This enables security teams to quickly focus their time and resources on preventing or mitigating loss. The editorial team at Dark Reading recently presented Vectra with the Best of Black Hat 2016 award for Most Innovative Emerging Company. Visit us at www.vectranetworks.com.

Vectra Networks Seminars

  • Catch an Active Cyber Attack in 5 Minutes or Less Matt Walmsley  |   Vectra Networks   |   Thu 6th Oct 13:40 - 14:10

    Cloud Security & IDAM Theatre

    Thu 6th Oct 13:40 to 14:10

    Catch an Active Cyber Attack in 5 Minutes or Less

    Cyber attackers operate undetected for an average of 146 days yet obtain admin credentials in less than 3. Detecting active attacks, reducing dwell time and accelerating incident response is key. But how?

    Vectra automates the hunt for hidden attacks inside campus networks, data centers and the cloud using advanced machine learning and data science to monitor internal traffic to detect active threats in real-time. Vectra correlates threats with under attack hosts, provides unique context about what attackers are doing, and prioritises the threats of greatest risk.

    Speaker

    Photo Speaker Name Profile
    Matt Walmsley Matt Walmsley View Profile

White papers

Automated threat management: No signature required
Signatures are great at catching large-scale commodity threats. But to stop targeted attacks, you need to jump off the signature hamster wheel and lay in wait where attackers will inevitably show up – inside your network.

vectra-wp-signatures.pdf 284.13 kB


The Data Science Behind Vectra Threat Detetcions
The Vectra Automated Threat Management model blends human expertise with a broad set of data science and sophisticated machine learning techniques.

the-data-science-behind-vectra-threat-detections.pdf 1.60 MB


Minding the cybersecurity gap
The cybersecurity gap exists between the time an attacker successfully evades prevention security systems at the perimeter and the clean-up phase when an organization discovers that key assets have been stolen or destroyed.

Vectra-Ebook-MindingCybersecurityGap-English.pdf 219.33 kB


The Vectra Networks cybersecurity platform (Data sheet)
Vectra delivers real-time attack visibility and puts attack details at your fingertips to empower immediate action.

datasheet(6).pdf 906.22 kB


Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook