Jump to content

Examine individual changes

This page allows you to examine the variables generated by the Edit Filter for an individual change.

Variables generated for this change

VariableValue
Edit count of the user (user_editcount)
38
Name of the user account (user_name)
'Mn04PR5'
Age of the user account (user_age)
50547474
Groups (including implicit) the user is in (user_groups)
[ 0 => '*', 1 => 'user', 2 => 'autoconfirmed' ]
Rights that the user has (user_rights)
[ 0 => 'createaccount', 1 => 'read', 2 => 'edit', 3 => 'createtalk', 4 => 'writeapi', 5 => 'viewmywatchlist', 6 => 'editmywatchlist', 7 => 'viewmyprivateinfo', 8 => 'editmyprivateinfo', 9 => 'editmyoptions', 10 => 'abusefilter-log-detail', 11 => 'urlshortener-create-url', 12 => 'centralauth-merge', 13 => 'abusefilter-view', 14 => 'abusefilter-log', 15 => 'vipsscaler-test', 16 => 'collectionsaveasuserpage', 17 => 'reupload-own', 18 => 'move-rootuserpages', 19 => 'createpage', 20 => 'minoredit', 21 => 'editmyusercss', 22 => 'editmyuserjson', 23 => 'editmyuserjs', 24 => 'purge', 25 => 'sendemail', 26 => 'applychangetags', 27 => 'spamblacklistlog', 28 => 'mwoauthmanagemygrants', 29 => 'reupload', 30 => 'upload', 31 => 'move', 32 => 'collectionsaveascommunitypage', 33 => 'autoconfirmed', 34 => 'editsemiprotected', 35 => 'skipcaptcha', 36 => 'transcode-reset', 37 => 'createpagemainns', 38 => 'movestable', 39 => 'autoreview' ]
Whether the user is editing from mobile app (user_app)
false
Whether or not a user is editing through the mobile interface (user_mobile)
false
Page ID (page_id)
47018111
Page namespace (page_namespace)
0
Page title without namespace (page_title)
'Vectra AI'
Full page title (page_prefixedtitle)
'Vectra AI'
Edit protection level of the page (page_restrictions_edit)
[]
Action (action)
'edit'
Edit summary/reason (summary)
''
Old content model (old_content_model)
'wikitext'
New content model (new_content_model)
'wikitext'
Old page wikitext, before the edit (old_wikitext)
'{{Advert|date=August 2019}} {{Infobox company | name = Vectra AI | type = Privately Held | industry = [[Information security|Information Security]] | founded = {{start date and age|2012}} (incorporated) | hq_location_city = [[San Jose, California|San Jose]], [[California]] | hq_location_country = [[United States|U.S.]] | area_served = North America, Europe, Middle East, Africa, and Asia-Pacific | website = {{URL|http://www.vectra.ai}} }} '''Vectra AI, Inc.''' applies [[artificial intelligence]] that detects and responds to hidden cyberattackers inside cloud, data center and enterprise networks. The company’s Cognito platform is designed to detect cyberattacker behaviors in these infrastructures and allow security analysts to conduct incident investigations and hunt for hidden threats using security-enriched metadata. To augment the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive the Cognito platform. Investors in Vectra include [[Khosla Ventures]], TCV, [[Accel Partners]], IA Ventures, AME Cloud Ventures, DAG Ventures, Wipro Ventures, Atlantic Bridge, the Ireland Strategic Investment Fund, Nissho Electronics, and Silver Lake. == History == Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks. The company is headquartered in San Jose, Calif., with facilities in Austin, Texas, Boston, Mass., Ireland, Switzerland, Germany, the United Kingdom and France.<ref>{{cite web|title=Contact Vectra|url=https://info.vectra.ai/contact-us-vectra-ai|website=Vectra|accessdate=16 April 2018}}</ref> Vectra’s team includes threat researchers, [[white hats]], [[data scientists]], security engineers, and [[user interface]] designers. Key executives are Hitesh Sheth, president and chief executive officer; Oliver Tavakoli, chief technology officer; Howie Shohet, chief financial officer; Kevin Moore, senior vice president of worldwide field operations; Jennifer Geisler, chief marketing officer; Jodi Sutton, vice president of business operations; Jennifer Wang, vice president of customer success; Mike Banic, vice president of community; Kevin Kennedy, vice president of product management; Jason Kehl, vice president of engineering; Aaron Bean, vice president of human resources; and Gerard Bauer, vice president of EMEA sales. Board members include Hitesh Sheth, president and CEO of Vectra; Bruce Armstrong, operating partner, Kholsa Ventures; Kevin Dillon, co-founder and managing partner of Atlantic Bridge; [[Charles Giancarlo]], CEO of Pure Storage; Brad Gillespie, general partner at IA Ventures; Tim McAdam, general partner TCV; Jim Messina, founder and CEO of the Messina Group; and Eric Wolford, venture partner at Accel Partners. == Products == The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks. Cognito analyzes network traffic<ref>{{cite web|title=The road rises up to meet Vectra Networks with $36 million in funding|url=https://vectra.ai/assets/451_reprint_vectra_22feb2018.pdf|website=451 Research|accessdate=16 April 2018}}</ref> in private data centers, public clouds and enterprise environments to detect hidden cyberattacker behaviors. The Cognito platform identifies and prioritizes all threat detections based on severity and certainty scores, which empowers IT security teams to prevent data loss by quickly mitigating the most serious attacks first.<ref>{{cite web|title=Vectra Networks|url=https://www.sdxcentral.com/listings/vectra-networks/|publisher=SDX Central|accessdate=16 April 2018}}</ref> Threat behaviors and cyberattack techniques detected by Cognito include [[botnet]] command-and-control communications, [[botnet]] monetization, internal reconnaissance, lateral movement, and [[data theft]], or exfiltration. Vectra offers three applications on the Cognito platform to address use cases: * Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. <ref>{{cite web|title=Vectra Recall overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5cae82a490434c84422d5317_BR-Cognito-Stream-Overview-041019.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> * Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. <ref>{{cite web|title=Vectra Recall overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a779c6d18ff3ccf94d55_BR-Cognito-Recall-Overview-040519.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> * Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.<ref>{{cite web|title=Vectra Detect overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a811c6d18f56cdf96582_HO-Cognito-Platform-Overview-040519.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.<ref>{{cite news|title=AI is changing SecOps: What security analysts need to know|url=https://techbeacon.com/ai-changing-secops-what-security-analysts-need-know|accessdate=16 April 2018|publisher=TechBeacon}}</ref> == Technology == Vectra AI combines data science, machine learning and network behavioral analysis technologies<ref>{{cite web|last1=Maiwald|first1=Eric|title=Network Behavior Analysis: Moving Beyond Signatures|url=https://www.gartner.com/doc/1405498/network-behavior-analysis-moving-signatures|website=Gartner|accessdate=16 April 2018}}</ref> to identify patterns that characterize malicious behavior within a network. Cognito uses [[artificial intelligence]], including [[supervised learning]], [[unsupervised machine learning]], and [[Deep learning|deep learning]] techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with [[security information and event management]] (SIEMs), [[Firewall (computing)|firewalls]], [[endpoint security]] enforcement, [[network access control]], and orchestration, which are integrated with Cognito via an [[application programming interface]]. Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI: * 10050985<ref>{{cite web|title=System for implementing threat detection using threat and risk assessment of asset-actor interactions|url=https://patents.google.com/patent/US10050985B2/en?oq=10050985|accessdate=15 April 2019}}</ref> * 9930053<ref>{{cite web|title=Method and system for detecting bot behavior|url=https://patents.google.com/patent/US9930053B2/en?oq=9930053|accessdate=15 April 2019}}</ref> * 9847968<ref>{{cite web|title=Method and system for generating durable host identifiers using network artifacts|url=https://patents.google.com/patent/US9847968B2/en?oq=9847968|accessdate=15 April 2019}}</ref> * 10033752<ref>{{cite web|title=System for implementing threat detection using daily network traffic community outliers|url=https://patents.google.com/patent/US10033752B2/en?oq=10033752|accessdate=15 April 2019}}</ref> * 9853988<ref>{{cite web|title=Method and system for detecting threats using metadata vectors|url=https://patents.google.com/patent/US9853988B2/en?oq=9853988+|accessdate=15 April 2019}}</ref> * 9807110<ref>{{cite web|title=Method and system for detecting algorithm-generated domains|url=https://patents.google.com/patent/US9807110B2/en?oq=9807110|accessdate=15 April 2019}}</ref> * 9900336<ref>{{cite web|title=System for detecting threats using scenario-based tracking of internal and external network traffic|url=https://patents.google.com/patent/US9900336B2/en?oq=9900336|accessdate=15 April 2019}}</ref> * EP3221793<ref>{{cite web|title=Method and system for detecting threats using passive cluster mapping|url=https://patents.google.com/patent/EP3221793B1/en?oq=EP3221793|accessdate=15 April 2019}}</ref> * 9237164<ref>{{cite web|title=Systems and methods for capturing, replaying, or analyzing time-series data|url=https://www.google.com/patents/US9237164|website=Google Patents|accessdate=16 April 2018}}</ref> * 9407647<ref>{{cite web|title=Systems and methods for capturing, replaying, or analyzing time-series data|url=https://www.google.com/patents/US9407647|website=Google Patents|accessdate=16 April 2018}}</ref> * 9565208<ref>{{cite web|title=System and method for detecting network intrusions using layered host scoring|url=https://www.google.com/patents/US20150264061|website=Google Patents|accessdate=16 April 2018}}</ref> * 9602533<ref>{{cite web|title=Detecting network reconnaissance by tracking intranet dark-net communications|url=https://www.google.com/patents/US20150264078|website=Google Patents|accessdate=16 April 2018}}</ref> * 9628512<ref>{{cite web|title=Malicious relay detection on networks|url=https://www.google.com/patents/US9628512|website=Google Patents|accessdate=16 April 2018}}</ref> == Attacker Behavior Industry Reports == Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle. * "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye”|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref> * "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref> * "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref> * "Student computers have proved to be a lucrative resource for cryptomining."<ref>{{cite news|title="Cryptocurrency Mining Poses a New Threat to College Campuses,”|url=https://edtechmagazine.com/higher/article/2019/01/cryptocurrency-mining-poses-new-threat-college-campuses |accessdate=22 April 2018|publisher=EdTech Magazine}}</ref> == Awards and Honors == Vectra and its customers have received industry recognition, including: * 2019 Deloitte 2019 Technology Fast 500 winners<ref>{{cite news|title=2019 Technology Fast 500|url=https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/fast500-winners.html|accessdate=22 November 2019|publisher=Deloitte}}</ref> * 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)<ref>{{cite news|title=2019 computing Security Excellence Awards|url=https://events.computing.co.uk/securityexcellence|accessdate=22 November 2019|publisher=computing}}</ref> * 2019 The Hot 150 Cybersecurity Companies<ref>{{cite news|title=Cybersecurity Ventures The Hot 150 Cybersecurity companies|url=https://cybersecurityventures.com/cybersecurity-companies-list-hot-150/#hot-150/?view_15_per_page=150&view_15_page=1|accessdate=22 November 2019|publisher=Cybersecurity Ventures}}</ref> * 2019 Stratus Awards for Cloud Computing<ref>{{cite news|title=Cybersecurity Ventures The Hot 150 Cybersecurity companies|url=https://www.bintelligence.com/stratus-awards|accessdate=22 November 2019|publisher=Business Intelligence Group}}</ref> * 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection<ref>{{cite news|title=2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)|url=https://www.scawardseurope.com/results-2019/|accessdate=22 November 2019|publisher=SC Media Europe}}</ref> * 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution<ref>{{cite news|title=2019 American Business Association Awards|url=https://stevieawards.com/aba/product-management-new-product-awards|accessdate=22 November 2019|publisher=American Business Association}}</ref> * 2019 The Software Report: Top 25 Women Leaders in Cybersecurity<ref>{{cite news|title=2019 The Software Report: Top 25 Women Leaders in Cybersecurity|url=https://www.thesoftwarereport.com/top-25-women-leaders-in-cybersecurity-of-2019/|accessdate=22 November 2019|publisher=The Software Report}}</ref> * 2019 Red Herring Top 100 Global Winner<ref>{{cite news|title=Red Herring Top 100 Global Winner|url=https://www.redherring.com/2018-red-herring-top-100-global-winners/|accessdate=22 November 2019|publisher=Red Herring}}</ref> * 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli<ref>{{cite news|title=Honoring Achievements in Artificial Intelligence|url=https://www.bintelligence.com/artificial-intelligence-excellence-awards|accessdate=15 April 2019|publisher=AI Intelligence Awards}}</ref> * 2019 CRN Security 100<ref>{{cite news|title=Vectra Recognized on CRN’s 2019 Security 100 List|url=https://www.vectra.ai/news/vectra-recognized-on-crns-2019-security-100-list|accessdate=15 April 2019|publisher=CRN}}</ref> * 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems<ref>{{cite web|last1=Craig Lawson|first1=Claudio Nevia|title=Magic Quadrant for Intrusion Detection and Prevention Systems|url=https://www.gartner.com/doc/3844163/magic-quadrant-intrusion-detection-prevention|website=Gartner|accessdate=16 April 2018}}</ref> {{Reflist}} [[Category:Companies based in San Jose, California]] [[Category:American companies established in 2012]] [[Category:Computer security companies]] [[Category:Networking companies of the United States]] [[Category:Artificial intelligence]]'
New page wikitext, after the edit (new_wikitext)
'{{Infobox company | name = Vectra AI | type = Privately Held | industry = [[Information security|Information Security]] | founded = {{start date and age|2012}} (incorporated) | hq_location_city = [[San Jose, California|San Jose]], [[California]] | hq_location_country = [[United States|U.S.]] | area_served = North America, Europe, Middle East, Africa, and Asia-Pacific | website = {{URL|http://www.vectra.ai}} }} '''Vectra AI, Inc.''' applies [[artificial intelligence]] that detects and responds to hidden cyberattackers inside cloud, data center and enterprise networks. The company’s Cognito platform is designed to detect cyberattacker behaviors in these infrastructures and allow security analysts to conduct incident investigations and hunt for hidden threats using security-enriched metadata. To augment the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive the Cognito platform. Investors in Vectra include [[Khosla Ventures]], TCV, [[Accel Partners]], IA Ventures, AME Cloud Ventures, DAG Ventures, Wipro Ventures, Atlantic Bridge, the Ireland Strategic Investment Fund, Nissho Electronics, and Silver Lake. == History == Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks. The company is headquartered in San Jose, Calif., with facilities in Austin, Texas, Boston, Mass., Ireland, Switzerland, Germany, the United Kingdom and France.<ref>{{cite web|title=Contact Vectra|url=https://info.vectra.ai/contact-us-vectra-ai|website=Vectra|accessdate=16 April 2018}}</ref> Vectra’s team includes threat researchers, [[white hats]], [[data scientists]], security engineers, and [[user interface]] designers. Key executives are Hitesh Sheth, president and chief executive officer; Oliver Tavakoli, chief technology officer; Howie Shohet, chief financial officer; Kevin Moore, senior vice president of worldwide field operations; Jennifer Geisler, chief marketing officer; Jodi Sutton, vice president of business operations; Jennifer Wang, vice president of customer success; Mike Banic, vice president of community; Kevin Kennedy, vice president of product management; Jason Kehl, vice president of engineering; Aaron Bean, vice president of human resources; and Gerard Bauer, vice president of EMEA sales. Board members include Hitesh Sheth, president and CEO of Vectra; Bruce Armstrong, operating partner, Kholsa Ventures; Kevin Dillon, co-founder and managing partner of Atlantic Bridge; [[Charles Giancarlo]], CEO of Pure Storage; Brad Gillespie, general partner at IA Ventures; Tim McAdam, general partner TCV; Jim Messina, founder and CEO of the Messina Group; and Eric Wolford, venture partner at Accel Partners. == Products == The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks. Cognito analyzes network traffic<ref>{{cite web|title=The road rises up to meet Vectra Networks with $36 million in funding|url=https://vectra.ai/assets/451_reprint_vectra_22feb2018.pdf|website=451 Research|accessdate=16 April 2018}}</ref> in private data centers, public clouds and enterprise environments to detect hidden cyberattacker behaviors. The Cognito platform identifies and prioritizes all threat detections based on severity and certainty scores, which empowers IT security teams to prevent data loss by quickly mitigating the most serious attacks first.<ref>{{cite web|title=Vectra Networks|url=https://www.sdxcentral.com/listings/vectra-networks/|publisher=SDX Central|accessdate=16 April 2018}}</ref> Threat behaviors and cyberattack techniques detected by Cognito include [[botnet]] command-and-control communications, [[botnet]] monetization, internal reconnaissance, lateral movement, and [[data theft]], or exfiltration. Vectra offers three applications on the Cognito platform to address use cases: * Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. <ref>{{cite web|title=Vectra Recall overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5cae82a490434c84422d5317_BR-Cognito-Stream-Overview-041019.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> * Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. <ref>{{cite web|title=Vectra Recall overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a779c6d18ff3ccf94d55_BR-Cognito-Recall-Overview-040519.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> * Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.<ref>{{cite web|title=Vectra Detect overview|url=https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a811c6d18f56cdf96582_HO-Cognito-Platform-Overview-040519.pdf|accessdate=15 April 2019|publisher=Vectra}}</ref> Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.<ref>{{cite news|title=AI is changing SecOps: What security analysts need to know|url=https://techbeacon.com/ai-changing-secops-what-security-analysts-need-know|accessdate=16 April 2018|publisher=TechBeacon}}</ref> == Technology == Vectra AI combines data science, machine learning and network behavioral analysis technologies<ref>{{cite web|last1=Maiwald|first1=Eric|title=Network Behavior Analysis: Moving Beyond Signatures|url=https://www.gartner.com/doc/1405498/network-behavior-analysis-moving-signatures|website=Gartner|accessdate=16 April 2018}}</ref> to identify patterns that characterize malicious behavior within a network. Cognito uses [[artificial intelligence]], including [[supervised learning]], [[unsupervised machine learning]], and [[Deep learning|deep learning]] techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with [[security information and event management]] (SIEMs), [[Firewall (computing)|firewalls]], [[endpoint security]] enforcement, [[network access control]], and orchestration, which are integrated with Cognito via an [[application programming interface]]. Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI: * 10050985<ref>{{cite web|title=System for implementing threat detection using threat and risk assessment of asset-actor interactions|url=https://patents.google.com/patent/US10050985B2/en?oq=10050985|accessdate=15 April 2019}}</ref> * 9930053<ref>{{cite web|title=Method and system for detecting bot behavior|url=https://patents.google.com/patent/US9930053B2/en?oq=9930053|accessdate=15 April 2019}}</ref> * 9847968<ref>{{cite web|title=Method and system for generating durable host identifiers using network artifacts|url=https://patents.google.com/patent/US9847968B2/en?oq=9847968|accessdate=15 April 2019}}</ref> * 10033752<ref>{{cite web|title=System for implementing threat detection using daily network traffic community outliers|url=https://patents.google.com/patent/US10033752B2/en?oq=10033752|accessdate=15 April 2019}}</ref> * 9853988<ref>{{cite web|title=Method and system for detecting threats using metadata vectors|url=https://patents.google.com/patent/US9853988B2/en?oq=9853988+|accessdate=15 April 2019}}</ref> * 9807110<ref>{{cite web|title=Method and system for detecting algorithm-generated domains|url=https://patents.google.com/patent/US9807110B2/en?oq=9807110|accessdate=15 April 2019}}</ref> * 9900336<ref>{{cite web|title=System for detecting threats using scenario-based tracking of internal and external network traffic|url=https://patents.google.com/patent/US9900336B2/en?oq=9900336|accessdate=15 April 2019}}</ref> * EP3221793<ref>{{cite web|title=Method and system for detecting threats using passive cluster mapping|url=https://patents.google.com/patent/EP3221793B1/en?oq=EP3221793|accessdate=15 April 2019}}</ref> * 9237164<ref>{{cite web|title=Systems and methods for capturing, replaying, or analyzing time-series data|url=https://www.google.com/patents/US9237164|website=Google Patents|accessdate=16 April 2018}}</ref> * 9407647<ref>{{cite web|title=Systems and methods for capturing, replaying, or analyzing time-series data|url=https://www.google.com/patents/US9407647|website=Google Patents|accessdate=16 April 2018}}</ref> * 9565208<ref>{{cite web|title=System and method for detecting network intrusions using layered host scoring|url=https://www.google.com/patents/US20150264061|website=Google Patents|accessdate=16 April 2018}}</ref> * 9602533<ref>{{cite web|title=Detecting network reconnaissance by tracking intranet dark-net communications|url=https://www.google.com/patents/US20150264078|website=Google Patents|accessdate=16 April 2018}}</ref> * 9628512<ref>{{cite web|title=Malicious relay detection on networks|url=https://www.google.com/patents/US9628512|website=Google Patents|accessdate=16 April 2018}}</ref> == Attacker Behavior Industry Reports == Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle. * "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."{{cite news|title=#Privacy: Research reveals that RDP remains a popular technique for cyberattackers|url=https://gdpr.report/news/2019/09/26/privacy-research-reveals-that-rdp-remains-a-popular-technique-for-cyberattackers/|accessdate=22 November 2019|publisher=PrivSec Report}}</ref> * "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."{{cite news|title=Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure|url=https://venturebeat.com/2019/08/07/vectra-ransomware-attacks-are-spreading-to-cloud-data-center-and-enterprise-infrastructure/|accessdate=22 November 2019|publisher=Venture Beat}}</ref> * "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref> * "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref> * "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref> == Awards and Honors == Vectra and its customers have received industry recognition, including: * 2019 Deloitte 2019 Technology Fast 500 winners<ref>{{cite news|title=2019 Technology Fast 500|url=https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/fast500-winners.html|accessdate=22 November 2019|publisher=Deloitte}}</ref> * 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)<ref>{{cite news|title=2019 computing Security Excellence Awards|url=https://events.computing.co.uk/securityexcellence|accessdate=22 November 2019|publisher=computing}}</ref> * 2019 The Hot 150 Cybersecurity Companies<ref>{{cite news|title=Cybersecurity Ventures The Hot 150 Cybersecurity companies|url=https://cybersecurityventures.com/cybersecurity-companies-list-hot-150/#hot-150/?view_15_per_page=150&view_15_page=1|accessdate=22 November 2019|publisher=Cybersecurity Ventures}}</ref> * 2019 Stratus Awards for Cloud Computing<ref>{{cite news|title=Cybersecurity Ventures The Hot 150 Cybersecurity companies|url=https://www.bintelligence.com/stratus-awards|accessdate=22 November 2019|publisher=Business Intelligence Group}}</ref> * 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection<ref>{{cite news|title=2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)|url=https://www.scawardseurope.com/results-2019/|accessdate=22 November 2019|publisher=SC Media Europe}}</ref> * 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution<ref>{{cite news|title=2019 American Business Association Awards|url=https://stevieawards.com/aba/product-management-new-product-awards|accessdate=22 November 2019|publisher=American Business Association}}</ref> * 2019 The Software Report: Top 25 Women Leaders in Cybersecurity<ref>{{cite news|title=2019 The Software Report: Top 25 Women Leaders in Cybersecurity|url=https://www.thesoftwarereport.com/top-25-women-leaders-in-cybersecurity-of-2019/|accessdate=22 November 2019|publisher=The Software Report}}</ref> * 2019 Red Herring Top 100 Global Winner<ref>{{cite news|title=Red Herring Top 100 Global Winner|url=https://www.redherring.com/2018-red-herring-top-100-global-winners/|accessdate=22 November 2019|publisher=Red Herring}}</ref> * 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli<ref>{{cite news|title=Honoring Achievements in Artificial Intelligence|url=https://www.bintelligence.com/artificial-intelligence-excellence-awards|accessdate=15 April 2019|publisher=AI Intelligence Awards}}</ref> * 2019 CRN Security 100<ref>{{cite news|title=Vectra Recognized on CRN’s 2019 Security 100 List|url=https://www.vectra.ai/news/vectra-recognized-on-crns-2019-security-100-list|accessdate=15 April 2019|publisher=CRN}}</ref> * 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems<ref>{{cite web|last1=Craig Lawson|first1=Claudio Nevia|title=Magic Quadrant for Intrusion Detection and Prevention Systems|url=https://www.gartner.com/doc/3844163/magic-quadrant-intrusion-detection-prevention|website=Gartner|accessdate=16 April 2018}}</ref> {{Reflist}} [[Category:Companies based in San Jose, California]] [[Category:American companies established in 2012]] [[Category:Computer security companies]] [[Category:Networking companies of the United States]] [[Category:Artificial intelligence]]'
Unified diff of changes made by edit (edit_diff)
'@@ -1,3 +1,2 @@ -{{Advert|date=August 2019}} {{Infobox company | name = Vectra AI @@ -69,10 +68,9 @@ Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle. - -* "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye”|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref> -* "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref> -* "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref> -* "Student computers have proved to be a lucrative resource for cryptomining."<ref>{{cite news|title="Cryptocurrency Mining Poses a New Threat to College Campuses,”|url=https://edtechmagazine.com/higher/article/2019/01/cryptocurrency-mining-poses-new-threat-college-campuses -|accessdate=22 April 2018|publisher=EdTech Magazine}}</ref> +* "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."{{cite news|title=#Privacy: Research reveals that RDP remains a popular technique for cyberattackers|url=https://gdpr.report/news/2019/09/26/privacy-research-reveals-that-rdp-remains-a-popular-technique-for-cyberattackers/|accessdate=22 November 2019|publisher=PrivSec Report}}</ref> +* "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."{{cite news|title=Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure|url=https://venturebeat.com/2019/08/07/vectra-ransomware-attacks-are-spreading-to-cloud-data-center-and-enterprise-infrastructure/|accessdate=22 November 2019|publisher=Venture Beat}}</ref> +* "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref> +* "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref> +* "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref> == Awards and Honors == '
New page size (new_size)
15526
Old page size (old_size)
15038
Size change in edit (edit_delta)
488
Lines added in edit (added_lines)
[ 0 => '* "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."{{cite news|title=#Privacy: Research reveals that RDP remains a popular technique for cyberattackers|url=https://gdpr.report/news/2019/09/26/privacy-research-reveals-that-rdp-remains-a-popular-technique-for-cyberattackers/|accessdate=22 November 2019|publisher=PrivSec Report}}</ref>', 1 => '* "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."{{cite news|title=Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure|url=https://venturebeat.com/2019/08/07/vectra-ransomware-attacks-are-spreading-to-cloud-data-center-and-enterprise-infrastructure/|accessdate=22 November 2019|publisher=Venture Beat}}</ref>', 2 => '* "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref>', 3 => '* "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref>', 4 => '* "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref>' ]
Lines removed in edit (removed_lines)
[ 0 => '{{Advert|date=August 2019}}', 1 => '', 2 => '* "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”<ref>{{cite news|title=Energy Sector's IT Networks in the Bulls-Eye”|url=https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201|accessdate=22 April 2018|publisher=Dark Reading}}</ref>', 3 => '* "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399|accessdate=22 April 2018|publisher=Dark Reading}}</ref>', 4 => '* "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."<ref>{{cite news|title=University Networks Become Fertile Ground for Cryptomining,”|url=https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693|accessdate=22 April 2018|publisher=SC Magazine}}</ref>', 5 => '* "Student computers have proved to be a lucrative resource for cryptomining."<ref>{{cite news|title="Cryptocurrency Mining Poses a New Threat to College Campuses,”|url=https://edtechmagazine.com/higher/article/2019/01/cryptocurrency-mining-poses-new-threat-college-campuses', 6 => '|accessdate=22 April 2018|publisher=EdTech Magazine}}</ref>' ]
Whether or not the change was made through a Tor exit node (tor_exit_node)
false
Unix timestamp of change (timestamp)
1574459417