Vectra AI

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by WikiCleanerBot (talk | contribs) at 03:28, 20 June 2022 (v2.04b - Bot T20 CW#61 - Fix errors for CW project (Reference before punctuation - Link equal to linktext)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Vectra AI
Company typePrivately Held
IndustryInformation Security
Founded2012; 12 years ago (2012) (incorporated)
FoundersMark Abene, James Harlacher, Marc Rogers, Ivan Wick[citation needed]
Headquarters,
Area served
North America, Europe, Middle East, Africa, Australia/New Zealand, Japan and Asia-Pacific
Websitewww.vectra.ai

Vectra AI, Inc. is a cybersecurity company with headquarters in San Jose, California.

History

Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks.[1]

Products

The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks.

Threat behaviors and cyberattack techniques detected by Cognito include botnet command-and-control communications, botnet monetization, internal reconnaissance, lateral movement, and data theft, or exfiltration.

Vectra offers three applications on the Cognito platform to address use cases:

  • Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. [2]
  • Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. [3]
  • Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.[4]

Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.[5]

Technology

Vectra AI combines data science, machine learning and network behavioral analysis technologies[6] to identify patterns that characterize malicious behavior within a network.

Cognito uses artificial intelligence, including supervised learning, unsupervised machine learning, and deep learning techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with security information and event management (SIEMs), firewalls, endpoint security enforcement, network access control, and orchestration, which are integrated with Cognito via an application programming interface.

Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI:

Attacker Behavior Industry Reports

Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle.

  • "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."[20]
  • "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."[21]
  • "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”[22]
  • "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."[23]
  • "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."[24]

Awards and honors

Vectra and its customers have received industry recognition, including:

  • 2022 Best Tech Startups in San Jose by the Tech Tribune.[25]
  • 2021 SC Awards Europe: shortlisted in the category of Best Use of Machine Learning and AI. [26]
  • 2021 recognized as a leader in the Best Network Traffic Analysis (NTA) Solutions,[27] Best Intrusion Detection System (IDS) Software[28] and Best Network Detection and Response (NDR) Solutions[29] by PeerSpot (formerly IT Central Station)
  • 2021 named to CRN's 20 Coolest Security Companies as part of their annual security 100 list and received a 5-star rating in the 2021 CRN Partner Program Guide..[30]
  • 2021 Best Tech Startups in San Jose by the Tech Tribune.[25]
  • 2020 finalist as a Security Trailblazer in the Microsoft Security 20/20 award.[31]
  • 2020 CISO50 & Future Security Awards: Winner in the Network Detection & Response vendor category[32]
  • 2020 Finalist in the Network Security category for the CISO Choice Awards.[33]
  • 2020 Computing Security Excellence Awards: Finalist in “Enterprise Threat Detection”, “Security Automation” categories and Winner of the “Network Security" Award.[34]
  • 2020 Award for Best Security Innovation in a SaaS Product from the SaaS Awards[35]
  • 2020 SC Awards Europe Winner for Best Customer Service, named as Highly Recommended in the Best Behaviour Analytics/Enterprise Threat Detection category and Finalist for Best Use of Machine Learning/AI.[36]
  • 2020 Silver Edison Award in the Innovative Services category for Security and Compliance Platforms[37]
  • 2020 Cybersecurity Excellence Awards - Series of Gold Awards for Threat Hunting, Security Analytics, AWS Cloud Security, Threat Detection Intelligence and Response, Artificial Intelligence Security, Silver Award for Security Automation and Bronze Award for Best Cybersecurity Company.[38]
  • 2020 Cyber Defense Magazine Infosec Awards - Next Gen Category for "Cloud Security" and "Artificial Intelligence and Machine Learning"
  • 2019 Deloitte 2019 Technology Fast 500 winners[39]
  • 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)[40]
  • 2019 The Hot 150 Cybersecurity Companies[41]
  • 2019 Stratus Awards for Cloud Computing[42]
  • 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection[43]
  • 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution[44]
  • 2019 The Software Report: Top 25 Women Leaders in Cybersecurity[45]
  • 2019 Red Herring Top 100 Global Winner[46]
  • 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli[47]
  • 2019 CRN Security 100[48]
  • 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems[49]

References

  1. ^ "Contact Vectra". Vectra. Retrieved 16 April 2018.
  2. ^ "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
  3. ^ "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
  4. ^ "Vectra Detect overview" (PDF). Vectra. Retrieved 15 April 2019.
  5. ^ "AI is changing SecOps: What security analysts need to know". TechBeacon. Retrieved 16 April 2018.
  6. ^ Maiwald, Eric. "Network Behavior Analysis: Moving Beyond Signatures". Gartner. Retrieved 16 April 2018.
  7. ^ "System for implementing threat detection using threat and risk assessment of asset-actor interactions". Retrieved 15 April 2019.
  8. ^ "Method and system for detecting bot behavior". Retrieved 15 April 2019.
  9. ^ "Method and system for generating durable host identifiers using network artifacts". Retrieved 15 April 2019.
  10. ^ "System for implementing threat detection using daily network traffic community outliers". Retrieved 15 April 2019.
  11. ^ "Method and system for detecting threats using metadata vectors". Retrieved 15 April 2019.
  12. ^ "Method and system for detecting algorithm-generated domains". Retrieved 15 April 2019.
  13. ^ "System for detecting threats using scenario-based tracking of internal and external network traffic". Retrieved 15 April 2019.
  14. ^ "Method and system for detecting threats using passive cluster mapping". Retrieved 15 April 2019.
  15. ^ "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
  16. ^ "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
  17. ^ "System and method for detecting network intrusions using layered host scoring". Google Patents. Retrieved 16 April 2018.
  18. ^ "Detecting network reconnaissance by tracking intranet dark-net communications". Google Patents. Retrieved 16 April 2018.
  19. ^ "Malicious relay detection on networks". Google Patents. Retrieved 16 April 2018.
  20. ^ "#Privacy: Research reveals that RDP remains a popular technique for cyberattackers". PrivSec Report. Retrieved 22 November 2019.
  21. ^ "Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure". Venture Beat. Retrieved 22 November 2019.
  22. ^ "Energy Sector's IT Networks in the Bulls-Eye". Dark Reading. Retrieved 22 April 2018.
  23. ^ "University Networks Become Fertile Ground for Cryptomining". Dark Reading. Retrieved 22 April 2018.
  24. ^ "University Networks Become Fertile Ground for Cryptomining". SC Magazine. Retrieved 22 April 2018.
  25. ^ a b "2022 Best Tech Startups in San Jose".
  26. ^ "SC Awards Europe 2021". SC Awards Europe.
  27. ^ "Best Network Traffic Analysis (NTA) Tools". Peerspot.
  28. ^ "Best Intrusion Detection and Prevention Software (IDPS)". Peerspot.
  29. ^ "Best Network Detection and Response (NDR) Software". Peerspot.
  30. ^ "CRN website".
  31. ^ "Finalists announced in second annual Microsoft Security 20/20 awards". Microsoft.com.
  32. ^ "CISO50 and Future Security Awards 2020: winners revealed".
  33. ^ "CISO Choice Awards™ 2020".
  34. ^ "2020 Computing Security Excellence Awards list".
  35. ^ "The SaaS Awards is pleased to announce the winners of the 2020 program".
  36. ^ "2020 Cybersecurity Product / Service Awards – Winners and Finalists". Cybersecurity Excellence Awards.
  37. ^ "2020 EDISON BEST NEW PRODUCT AWARDS™ WINNERS". Edison Awards.
  38. ^ "2020 Cybersecurity Product / Service Awards – Winners and Finalists". Cybersecurity Excellence Awards.
  39. ^ "2019 Technology Fast 500". Deloitte. Retrieved 22 November 2019.
  40. ^ "2019 computing Security Excellence Awards". computing. Retrieved 22 November 2019.
  41. ^ "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Cybersecurity Ventures. Retrieved 22 November 2019.
  42. ^ "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Business Intelligence Group. Retrieved 22 November 2019.
  43. ^ "2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)". SC Media Europe. Retrieved 22 November 2019.
  44. ^ "2019 American Business Association Awards". American Business Association. Retrieved 22 November 2019.
  45. ^ "2019 The Software Report: Top 25 Women Leaders in Cybersecurity". The Software Report. Retrieved 22 November 2019.
  46. ^ "Red Herring Top 100 Global Winner". Red Herring. Retrieved 22 November 2019.
  47. ^ "Honoring Achievements in Artificial Intelligence". AI Intelligence Awards. Retrieved 15 April 2019.
  48. ^ "Vectra Recognized on CRN's 2019 Security 100 List". CRN. Retrieved 15 April 2019.
  49. ^ Craig Lawson, Claudio Nevia. "Magic Quadrant for Intrusion Detection and Prevention Systems". Gartner. Retrieved 16 April 2018.