Vectra AI: Difference between revisions
removed advertisement-like content Tags: references removed Visual edit |
|||
Line 12: | Line 12: | ||
| website = {{URL|http://www.vectra.ai}} |
| website = {{URL|http://www.vectra.ai}} |
||
}} |
}} |
||
'''Vectra AI, Inc.''' is a cybersecurity company with headquarters in [[San Jose, California]]. |
|||
'''Vectra AI, Inc.''' applies [[artificial intelligence]] that detects and responds to hidden cyberattackers inside cloud, data center and enterprise networks. |
|||
The company’s Cognito platform is designed to detect cyberattacker behaviors in these infrastructures and allow security analysts to conduct incident investigations and hunt for hidden threats using security-enriched metadata. |
|||
To augment the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive the Cognito platform. |
|||
Investors in Vectra include [[Khosla Ventures]], TCV, [[Accel Partners]], IA Ventures, AME Cloud Ventures, DAG Ventures, Wipro Ventures, Atlantic Bridge, the Ireland Strategic Investment Fund, Nissho Electronics, and Silver Lake. |
|||
== History == |
== History == |
||
Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks |
Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks.<ref>{{cite web|title=Contact Vectra|url=https://info.vectra.ai/contact-us-vectra-ai|website=Vectra|access-date=16 April 2018}}</ref> |
||
Vectra’s team includes threat researchers, [[white hats]], [[data scientists]], security engineers, and [[user interface]] designers. |
|||
Key executives are Hitesh Sheth, president and chief executive officer; Jennifer Geisler, chief marketing officer; Oliver Tavakoli, chief technology officer; Howie Shohet, chief financial officer; Jodi Sutton, vice president of business operations;Kevin Kennedy, vice president of product management; Jason Kehl, vice president of engineering; Aaron Bean, vice president of human resources; and Marc Gemassmer, chief revenue officer |
|||
Board members include Hitesh Sheth, president and CEO of Vectra; Bruce Armstrong, operating partner, Kholsa Ventures; Kevin Dillon, co-founder and managing partner of Atlantic Bridge; [[Charles Giancarlo]], CEO of Pure Storage; Brad Gillespie, general partner at IA Ventures; Tim McAdam, general partner TCV; Jim Messina, founder and CEO of the Messina Group; and Eric Wolford, venture partner at Accel Partners. |
|||
== Products == |
== Products == |
||
The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks. |
The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks. |
||
Cognito analyzes network traffic<ref>{{cite web|title=The road rises up to meet Vectra Networks with $36 million in funding|url=https://vectra.ai/assets/451_reprint_vectra_22feb2018.pdf|website=451 Research|access-date=16 April 2018}}</ref> in private data centers, public clouds and enterprise environments to detect hidden cyberattacker behaviors. The Cognito platform identifies and prioritizes all threat detections based on severity and certainty scores, which empowers IT security teams to prevent data loss by quickly mitigating the most serious attacks first.<ref>{{cite web|title=Vectra Networks|url=https://www.sdxcentral.com/listings/vectra-networks/|publisher=SDX Central|access-date=16 April 2018}}</ref> |
|||
Threat behaviors and cyberattack techniques detected by Cognito include [[botnet]] command-and-control communications, [[botnet]] monetization, internal reconnaissance, lateral movement, and [[data theft]], or exfiltration. |
Threat behaviors and cyberattack techniques detected by Cognito include [[botnet]] command-and-control communications, [[botnet]] monetization, internal reconnaissance, lateral movement, and [[data theft]], or exfiltration. |
Revision as of 09:38, 28 May 2022
A major contributor to this article appears to have a close connection with its subject. (June 2021) |
This article contains promotional content. (February 2021) |
Company type | Privately Held |
---|---|
Industry | Information Security |
Founded | 2012 | (incorporated)
Founders | Mark Abene, James Harlacher, Marc Rogers, Ivan Wick[citation needed] |
Headquarters | , |
Area served | North America, Europe, Middle East, Africa, Australia/New Zealand, Japan and Asia-Pacific |
Website | www |
Vectra AI, Inc. is a cybersecurity company with headquarters in San Jose, California.
History
Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks.[1]
Products
The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks.
Threat behaviors and cyberattack techniques detected by Cognito include botnet command-and-control communications, botnet monetization, internal reconnaissance, lateral movement, and data theft, or exfiltration.
Vectra offers three applications on the Cognito platform to address use cases:
- Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. [2]
- Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. [3]
- Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.[4]
Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.[5]
Technology
Vectra AI combines data science, machine learning and network behavioral analysis technologies[6] to identify patterns that characterize malicious behavior within a network.
Cognito uses artificial intelligence, including supervised learning, unsupervised machine learning, and deep learning techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with security information and event management (SIEMs), firewalls, endpoint security enforcement, network access control, and orchestration, which are integrated with Cognito via an application programming interface.
Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI:
- 10050985[7]
- 9930053[8]
- 9847968[9]
- 10033752[10]
- 9853988[11]
- 9807110[12]
- 9900336[13]
- EP3221793[14]
- 9237164[15]
- 9407647[16]
- 9565208[17]
- 9602533[18]
- 9628512[19]
Attacker Behavior Industry Reports
Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle.
- "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."[20]
- "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."[21]
- "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”[22]
- "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."[23]
- "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."[24]
Awards and honors
Vectra and its customers have received industry recognition, including:
- 2020 Cyber Defense Magazine Infosec Awards - Next Gen Category for "Cloud Security" and "Artificial Intelligence and Machine Learning"[25]
- 2019 Deloitte 2019 Technology Fast 500 winners[26]
- 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)[27]
- 2019 The Hot 150 Cybersecurity Companies[28]
- 2019 Stratus Awards for Cloud Computing[29]
- 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection[30]
- 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution[31]
- 2019 The Software Report: Top 25 Women Leaders in Cybersecurity[32]
- 2019 Red Herring Top 100 Global Winner[33]
- 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli[34]
- 2019 CRN Security 100[35]
- 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems[36]
References
- ^ "Contact Vectra". Vectra. Retrieved 16 April 2018.
- ^ "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
- ^ "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
- ^ "Vectra Detect overview" (PDF). Vectra. Retrieved 15 April 2019.
- ^ "AI is changing SecOps: What security analysts need to know". TechBeacon. Retrieved 16 April 2018.
- ^ Maiwald, Eric. "Network Behavior Analysis: Moving Beyond Signatures". Gartner. Retrieved 16 April 2018.
- ^ "System for implementing threat detection using threat and risk assessment of asset-actor interactions". Retrieved 15 April 2019.
- ^ "Method and system for detecting bot behavior". Retrieved 15 April 2019.
- ^ "Method and system for generating durable host identifiers using network artifacts". Retrieved 15 April 2019.
- ^ "System for implementing threat detection using daily network traffic community outliers". Retrieved 15 April 2019.
- ^ "Method and system for detecting threats using metadata vectors". Retrieved 15 April 2019.
- ^ "Method and system for detecting algorithm-generated domains". Retrieved 15 April 2019.
- ^ "System for detecting threats using scenario-based tracking of internal and external network traffic". Retrieved 15 April 2019.
- ^ "Method and system for detecting threats using passive cluster mapping". Retrieved 15 April 2019.
- ^ "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
- ^ "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
- ^ "System and method for detecting network intrusions using layered host scoring". Google Patents. Retrieved 16 April 2018.
- ^ "Detecting network reconnaissance by tracking intranet dark-net communications". Google Patents. Retrieved 16 April 2018.
- ^ "Malicious relay detection on networks". Google Patents. Retrieved 16 April 2018.
- ^ "#Privacy: Research reveals that RDP remains a popular technique for cyberattackers". PrivSec Report. Retrieved 22 November 2019.
- ^ "Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure". Venture Beat. Retrieved 22 November 2019.
- ^ "Energy Sector's IT Networks in the Bulls-Eye". Dark Reading. Retrieved 22 April 2018.
- ^ "University Networks Become Fertile Ground for Cryptomining". Dark Reading. Retrieved 22 April 2018.
- ^ "University Networks Become Fertile Ground for Cryptomining". SC Magazine. Retrieved 22 April 2018.
- ^ "2020 Cyber Defense Magazine Infosec Awards". Cyber Defense Magazine. Retrieved 3 March 2021.
- ^ "2019 Technology Fast 500". Deloitte. Retrieved 22 November 2019.
- ^ "2019 computing Security Excellence Awards". computing. Retrieved 22 November 2019.
- ^ "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Cybersecurity Ventures. Retrieved 22 November 2019.
- ^ "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Business Intelligence Group. Retrieved 22 November 2019.
- ^ "2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)". SC Media Europe. Retrieved 22 November 2019.
- ^ "2019 American Business Association Awards". American Business Association. Retrieved 22 November 2019.
- ^ "2019 The Software Report: Top 25 Women Leaders in Cybersecurity". The Software Report. Retrieved 22 November 2019.
- ^ "Red Herring Top 100 Global Winner". Red Herring. Retrieved 22 November 2019.
- ^ "Honoring Achievements in Artificial Intelligence". AI Intelligence Awards. Retrieved 15 April 2019.
- ^ "Vectra Recognized on CRN's 2019 Security 100 List". CRN. Retrieved 15 April 2019.
- ^ Craig Lawson, Claudio Nevia. "Magic Quadrant for Intrusion Detection and Prevention Systems". Gartner. Retrieved 16 April 2018.