Automated Threat Management

Automated Threat Protection

A New Class of APT Defense

Vectra Networks delivers a new class of advanced persistent threat (APT) defense delivering real-time detection and analysis of active network breaches.

 

Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet-bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within your network.

Vectra uses a patent-pending combination of data science, machine learning, and behavioral analysis to detect malicious behavior in the network. All detections are correlated and prioritized to show an attack in context, and Vectra Networks’ machine learning adapts as attacks evolve.

Detects all phases of an active attack

Vectra Networks picks up where traditional security stops by providing real-time detection of all phases of an ongoing cyber attack. The solution detects command and control, internal reconnaissance, lateral movement, data exfiltration, and botnet monetization behaviors.

Automatically correlates and prioritizes hosts at the center of attacks

Vectra Networks’ Threat Certainty Index automatically consolidates all detections and confidence scores to quickly reveal the specific hosts that pose the greatest risk to the network so that teams can immediately focus on the detections that matter most.

Detections based on data science not signatures

Vectra uses a patent-pending combination of data science, machine learning, and behavioral analysis to reveal the fundamental characteristics of malicious behavior without the need for countless signatures and reputation-based rules.

Investigations that put key assets first

Vectra Networks’ Community Threat Analysis automatically learns the naturally occurring communities in your networks, and provides a visual map of the relationship between threats, hosts, and key assets. This ensures security teams can quickly see threats in the context of other network assets and the potential impact of the attack.

Single-click access to attack details

Vectra ensures that the proof of a threat detection is always immediately available. Whether investigating specific detections or hosts, security operations and incident response teams can access packet captures in one click for further analysis.

Detection Triage

Custom detection categories enable staff to track misconfigurations, and high-risk application or out-of-policy user behavior that can potentially enable or obscure a cyber attack.

Distributed Architecture

Vectra Networks’ Adaptive Distributed Architecture provides a simple and efficient way to extend cybersecurity to all areas of an organization. Security teams can seamlessly monitor remote sites where attackers may start their attack as well as internal network segments that contain key assets attackers may attempt to steal. This distributed architecture delivers full visibility into all enterprise traffic and maintains a unified view of cybersecurity posture.