Jump to content

Vectra AI: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m removed blocks "sources exist" and stubs
Line 1: Line 1:
{{Sources exist|date=April 2023}}
{{Infobox company
{{Infobox company
| name = Vectra AI
| name = Vectra AI
Line 96: Line 95:
[[Category:Networking companies of the United States]]
[[Category:Networking companies of the United States]]
[[Category:AI companies]]
[[Category:AI companies]]


{{US-company-stub}}
{{computer-security-stub}}

Revision as of 12:35, 6 September 2023

Vectra AI
FormerlyVectra Networks
Company typePrivately held
IndustryInformation Security
Founded2011; 13 years ago (2011) (incorporated)
FoundersMark Abene, James Harlacher, Marc Rogers, Ivan Wick[citation needed]
Headquarters,
Number of locations
11 offices; 3 Security Operations Centers (2023)
Area served
North America, Europe, Middle East, Africa, Australia/New Zealand, Japan and Asia-Pacific
Key people
Hitesh Sheth (CEO)

Scott Dussault (CFO) Willem Hendrickx (CRO)

Oliver Tavakoli (CTO)
ProductsVectra AI Platform (formerly Cognito Platform), Vectra Detect, Vectra Recall, Vectra Stream
ServicesMDR (Managed security service)
Websitewww.vectra.ai

Vectra AI, Inc. is a cybersecurity company specializing in AI applied to network detection and response (NDR) solutions. Established in 2012, Vectra AI operates from its headquarters in San Jose, California.

History

Vectra AI was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2011 under the name Vectra Networks.[1] The company changed its name to Vectra AI in 2018.

In April 2021, Vectra raised $130 million.[2]

Vectra Networks Logo
Former Vectra Networks Logo before rebranding to Vectra AI

Product

Vectra AI employs a unique array of artificial intelligence techniques[3], including supervised (pre-trained), unsupervised machine learning and deep learning techniques, to detect and respond to in-progress cyberattacks in real time.

Vectra AI's x-series appliance
Vectra AI's x-series appliance

The product’s algorithms continuously learn the behavioral norms of devices, user accounts, ports and protocols to identify signs of compromise across enterprise infrastructure. Threats are automatically triaged, scored and correlated[4] to compromised hosts, and attack behaviors are correlated across hosts to provide the “narrative” of developing attacks. These threats are prioritized on an intuitive user interface[5] while alerting and remediation actions are taken with other security technologies[6].


Patents references

US patent 20160149936, Lopes Pegna, David & Beauchesne, Nicolas, "Method and system for detecting threats using passive cluster mapping", published 2016-05-26, issued 2018-05-29, assigned to Vectra Networks, Inc. 

US patent 20150264068, Beauschesne, Nicolas, "Method and system for detecting bot behavior", published 2015-09-17, issued 2018-03-27, assigned to Vectra Networks, Inc. 

US patent 20150312211, Beauchesne, Nicolas; Sher Gill, Monty & Kourosh Tavakoli, Oliver, "Method and system for generating durable host identifiers using network artifacts", published 2015-10-29, issued 2017-12-19, assigned to Vectra Networks, Inc. 

US patent 20160191551, BEAUCHESNE, NICOLAS; PEGNA, DAVID LOPES & LYNN, KARL, "Method and system for detecting threats using metadata vectors", published 2016-06-30, issued 2017-12-26, assigned to VECTRA NETWORKS INC 

US patent 2015264083, PRENGER, RYAN JAMES; BEAUCHESNE, NICOLAS & LYNN, KARL MATTHEW, "Malicious relay detection on networks", published 2015-09-17, issued 2017-04-18, assigned to VECTRA NETWORKS INC 

US patent 10033752, PEGNA, DAVID LOPES; MHATRE, HIMANSHU & BRDICZKA, OLIVER, "System for implementing threat detection using daily network traffic community outliers", issued 2018-07-24, assigned to VECTRA NETWORKS 

US patent 9602533, BEAUCHESNE, NICOLAS & YOON, SUNGWOOK, "Detecting network reconnaissance by tracking intranet dark-net communications", published 2015-09-17, issued 2017-03-21, assigned to VECTRA NETWORKS INC 

US patent 2016191563, BEAUCHESNE, NICOLAS & PEGNA, DAVID LOPES, "System for detecting threats using scenario-based tracking of internal and external network traffic", published 2016-06-30, issued 2018-02-20, assigned to VECTRA NETWORKS INC 

US application 2015264073, TAVAKOLI, OLIVER KOUROSH; MA, TAO & HUANG, VENABLE et al., "SYSTEM AND METHOD FOR DETECTING INTRUSIONS THROUGH REAL-TIME PROCESSING OF TRAFFIC WITH EXTENSIVE HISTORICAL PERSPECTIVE", published 2015-09-17, assigned to VECTRA NETWORKS INC 

US patent 2015264069, BEAUCHESNE, NICOLAS & RYAN JAMES, PRENGER, "Method and system for detecting external control of compromised hosts", published 2015-09-17, issued 2016-08-02, assigned to VECTRA NETWORKS INC 

US application 20210105290, BEAUCHESNE, NICOLAS & MANCINI, JOHN STEVEN, "METHOD AND SYSTEM FOR DETECTING MALICIOUS PAYLOADS", published 2018-03-15, assigned to VECTRA AI INC 

US patent 10050985, MHATRE, HIMANSHU; DAVID LOPES, PEGNA & BRDICZKA, OLIVER, "System for implementing threat detection using threat and risk assessment of asset-actor interactions", issued 2018-08-14, assigned to VECTRA NETWORKS INC 

US patent 10404730, VENABLE, SR JEFFREY CHARLES, "High-volume network threat trace engine", issued 2019-09-03, assigned to VECTRA NETWORKS INC 

US patent 2015082433, HARLACHER, JAMES & ABENE, MARK, "Systems and methods for capturing, replaying, or analyzing time-series data", published 2015-03-19, issued 2016-01-12, assigned to VECTRA NETWORKS INC 

EP patent 3355547, SILVER, MATTHEW R & KAZEROUNIAN, SOHROB, "Method and system for learning representations of network flow traffic", published 2018-08-01, issued 2020-12-29, assigned to VECTRA NETWORKS INC 

EP patent 3484122, MHATRE, HIMANSHU & BEAUCHESNE, NICOLAS, "Malicious relay and jump-system detection using behavioral indicators of actors", published 2019-05-15, issued 2021-11-23, assigned to VECTRA NETWORKS INC 

US patent 2015264061, IBATULLIN, OSKAR; PRENGER, RYAN JAMES & BEAUCHESNE, NICOLAS et al., "System and method for detecting network intrusions using layered host scoring", published 2015-09-17, issued 2017-02-07, assigned to VECTRA NETWORKS INC 

EP patent 3117557, HARLACHER, JAMES PATRICK; SOOD, ADITYA & IBATULLIN, OSKAR, "Method and system for detecting algorithm-generated domains", published 2017-01-18, issued 2017-10-31, assigned to EP3117557 

US patent 10623428, BEAUCHESNE, NICOLAS & NI, KEVIN SONG-KAI, "Method and system for detecting suspicious administrative activity", issued 2020-04-14, assigned to VECTRA NETWORKS INC 

US application 2018115570, OLLMANN, GUNTER DANIEL, "SYSTEM AND METHOD FOR CATEGORIZING MALWARE", published 2018-04-26, assigned to VECTRA NETWORKS INC 

US patent 11330005, BEAUCHESNE, NICOLAS; MHATRE, HIMANSHU & HANNAH, DANIEL CARLTON, "Privileged account breach detections based on behavioral access patterns", issued 2022-05-10, assigned to VECTRA NETWORKS INC and VECTRA AI INC 

US application 2021092140, KAZEROUNIAN, SOHROB; HANNAH, DANIEL CARLTON & OIKARINEN, TUOMAS P, "METHOD, PRODUCT, AND SYSTEM FOR DETECTING MALICIOUS NETWORK ACTIVITY USING A GRAPH MIXTURE DENSITY NEURAL NETWORK", published 2021-03-25, assigned to VECTRA AI INC 

US patent 11595416, CHEN, HSIN; BEAUCHESNE, NICOLAS & MHATRE, MANCINI et al., "Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network", issued 2023-02-28, assigned to VECTRA AI INC 

References

  1. ^ "Contact Vectra". Vectra. Retrieved 16 April 2018.
  2. ^ Lunden, Ingrid (April 29, 2021). "Vectra AI picks up $130M at a $1.2B valuation for its network approach to threat detection and response".
  3. ^ "The data science behind Vectra AI threat detection models" (PDF).
  4. ^ "Understanding Vectra AI" (PDF).
  5. ^ "Vectra Analyst User Experiences (Respond vs Quadrant)".
  6. ^ "29 Integrations with Vectra AI". SourceForge.

Further reading