Welcome!

News Feed Item

Vectra Delivers First Security Platform that Thinks—to Automatically Detect and Report Cyberattacks at Every Phase of the Attack

Vectra Networks, the leading innovator in real-time detection of in-progress cyberattacks, today launched the X-series platform. The Vectra platform is a “security platform that thinks,” providing continuous real-time detection at every phase of a cyberattack. The X-series platform automatically delivers prioritized actionable reports, enabling organizations to effectively prioritize resources to stop attacks or mitigate loss.

“Enterprises are overly dependent on blocking and prevention mechanisms that are decreasingly effective against advanced attacks,” according to Gartner in its February 12, 2014 report, Designing an Adaptive Security Architecture for Protection from Advanced Attacks. The report also states: “Information security doesn't have the continuous visibility it needs to detect advanced attacks.”

Delivering a new class of advanced persistent threat detection

The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked. Combining security research, data science and machine learning, the X-series platform continuously monitors an organization’s network and can detect an attack amidst the surrounding network chatter. The Vectra X-series monitors traffic between users and both Internet services and applications in the data center to detect attacks across a company’s entire attack surface. The Vectra platform provides automated, intuitive and prioritized reporting so security analysts can address the highest business risks quickly, rather than spending valuable time sifting through thousands of alerts.

“The user experience of Vectra is amazing,” said Sam Kamran, chief information security officer of Riverbed Technologies (NASDAQ: RVBD), the leader in Application Performance Infrastructure. “It is a product designed for technical professionals, but it’s as intuitive as a consumer product. When we need to know something, the Vectra platform tells us without the noise of false positives. Vectra saves time and protects us from the unknown.”

“Vectra addresses a real and very challenging problem for organizations that receive too many security alarms, which become noise,” said Jon Oltsik, principal analyst at Enterprise Strategy Group. "Vectra differentiates real threats from noise, and as an attack intensifies, the Vectra platform reports updates in real time.”

"Vectra delivers real-time insights into every stage of cyberattacks with next-to-zero operational cost to our customers,” said Hitesh Sheth, president and CEO of Vectra Networks. “We provide solutions that empower IT organizations to make prioritized decisions to protect their infrastructure."

Dealing with the realities of modern cyberattacks

A recent report from the World Economic Forum and McKinsey & Company notes that 80 percent of organizations surveyed reported that attackers’ capabilities were improving faster than the ability to defend against them, and that escalating security concerns could slow the progress of cloud computing and mobility initiatives.

“Organizations are starting to understand the value of hygiene,” said Jane Lute, president and CEO of the Council on CyberSecurity and former deputy secretary of the Department of Homeland Security. “At the Department of Homeland Security, we developed Continuous Diagnostics and Mitigation, and what I like about Vectra is their ability to sit within your network, detect anomalous behavior, recognize a risk quickly even if it hasn’t been seen before, and enable mitigation in real time.”

The Vectra X-series platform

Features of the Vectra X-series platform include the following:

  • Simple to deploy – With a few simple instructions, the Vectra software is ready to use.
  • Works for everything – Vectra identifies attacks on all operating systems, applications and devices.
  • Continuous and real time – Vectra monitors nonstop and detects when the attack starts, changes or subsides.
  • Another brain always helps – Machine learning and data science enable Vectra to detect never-seen-before attacks across every phase of the attack.
  • Intuitive adaptive reporting – The Vectra Threat Certainty Index™ built into the X-series platform automatically prioritizes the highest risks to the organization.
  • Mobile-workforce friendly – Vectra detects threats carried into the network on personal mobile devices that perimeter security systems never see.

Price and availability

The Vectra X-series platform with a one-year algorithm subscription starts at a list price of $55,000 and is available immediately.

About Vectra Networks

Vectra Networks is the leading innovator in real-time detection of in-progress cyberattacks. Vectra delivers continuous automated cyberattack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...