News Feed Item

Vectra Delivers First Security Platform that Thinks—to Automatically Detect and Report Cyberattacks at Every Phase of the Attack

Vectra Networks, the leading innovator in real-time detection of in-progress cyberattacks, today launched the X-series platform. The Vectra platform is a “security platform that thinks,” providing continuous real-time detection at every phase of a cyberattack. The X-series platform automatically delivers prioritized actionable reports, enabling organizations to effectively prioritize resources to stop attacks or mitigate loss.

“Enterprises are overly dependent on blocking and prevention mechanisms that are decreasingly effective against advanced attacks,” according to Gartner in its February 12, 2014 report, Designing an Adaptive Security Architecture for Protection from Advanced Attacks. The report also states: “Information security doesn't have the continuous visibility it needs to detect advanced attacks.”

Delivering a new class of advanced persistent threat detection

The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked. Combining security research, data science and machine learning, the X-series platform continuously monitors an organization’s network and can detect an attack amidst the surrounding network chatter. The Vectra X-series monitors traffic between users and both Internet services and applications in the data center to detect attacks across a company’s entire attack surface. The Vectra platform provides automated, intuitive and prioritized reporting so security analysts can address the highest business risks quickly, rather than spending valuable time sifting through thousands of alerts.

“The user experience of Vectra is amazing,” said Sam Kamran, chief information security officer of Riverbed Technologies (NASDAQ: RVBD), the leader in Application Performance Infrastructure. “It is a product designed for technical professionals, but it’s as intuitive as a consumer product. When we need to know something, the Vectra platform tells us without the noise of false positives. Vectra saves time and protects us from the unknown.”

“Vectra addresses a real and very challenging problem for organizations that receive too many security alarms, which become noise,” said Jon Oltsik, principal analyst at Enterprise Strategy Group. "Vectra differentiates real threats from noise, and as an attack intensifies, the Vectra platform reports updates in real time.”

"Vectra delivers real-time insights into every stage of cyberattacks with next-to-zero operational cost to our customers,” said Hitesh Sheth, president and CEO of Vectra Networks. “We provide solutions that empower IT organizations to make prioritized decisions to protect their infrastructure."

Dealing with the realities of modern cyberattacks

A recent report from the World Economic Forum and McKinsey & Company notes that 80 percent of organizations surveyed reported that attackers’ capabilities were improving faster than the ability to defend against them, and that escalating security concerns could slow the progress of cloud computing and mobility initiatives.

“Organizations are starting to understand the value of hygiene,” said Jane Lute, president and CEO of the Council on CyberSecurity and former deputy secretary of the Department of Homeland Security. “At the Department of Homeland Security, we developed Continuous Diagnostics and Mitigation, and what I like about Vectra is their ability to sit within your network, detect anomalous behavior, recognize a risk quickly even if it hasn’t been seen before, and enable mitigation in real time.”

The Vectra X-series platform

Features of the Vectra X-series platform include the following:

  • Simple to deploy – With a few simple instructions, the Vectra software is ready to use.
  • Works for everything – Vectra identifies attacks on all operating systems, applications and devices.
  • Continuous and real time – Vectra monitors nonstop and detects when the attack starts, changes or subsides.
  • Another brain always helps – Machine learning and data science enable Vectra to detect never-seen-before attacks across every phase of the attack.
  • Intuitive adaptive reporting – The Vectra Threat Certainty Index™ built into the X-series platform automatically prioritizes the highest risks to the organization.
  • Mobile-workforce friendly – Vectra detects threats carried into the network on personal mobile devices that perimeter security systems never see.

Price and availability

The Vectra X-series platform with a one-year algorithm subscription starts at a list price of $55,000 and is available immediately.

About Vectra Networks

Vectra Networks is the leading innovator in real-time detection of in-progress cyberattacks. Vectra delivers continuous automated cyberattack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, you'll learn about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how Docke...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...