Company:Vectra AI

From HandWiki
Vectra AI
TypePrivately Held
IndustryInformation Security
Founded2012; 12 years ago (2012) (incorporated)
FoundersMark Abene, James Harlacher, Marc Rogers, Ivan Wick[citation needed]
Headquarters
San Jose, California
,
Area served
North America, Europe, Middle East, Africa, Australia/New Zealand, Japan and Asia-Pacific
Websitewww.vectra.ai

Vectra AI, Inc. is a cybersecurity company with headquarters in San Jose, California.

History

Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks.[1]

Products

The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks.

Threat behaviors and cyberattack techniques detected by Cognito include botnet command-and-control communications, botnet monetization, internal reconnaissance, lateral movement, and data theft, or exfiltration.

Vectra offers three applications on the Cognito platform to address use cases:

  • Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. [2]
  • Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. [3]
  • Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.[4]

Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.[5]

Technology

Vectra AI combines data science, machine learning and network behavioral analysis technologies[6] to identify patterns that characterize malicious behavior within a network.

Cognito uses artificial intelligence, including supervised learning, unsupervised machine learning, and deep learning techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with security information and event management (SIEMs), firewalls, endpoint security enforcement, network access control, and orchestration, which are integrated with Cognito via an application programming interface.

Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI:

Attacker Behavior Industry Reports

Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle.

  • "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."[20]
  • "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."[21]
  • "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”[22]
  • "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."[23]
  • "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."[24]

Awards and honors

Vectra and its customers have received industry recognition, including:

  • 2022 Best Tech Startups in San Jose by the Tech Tribune.[25]
  • 2021 SC Awards Europe: shortlisted in the category of Best Use of Machine Learning and AI. [26]
  • 2021 recognized as a leader in the Best Network Traffic Analysis (NTA) Solutions,[27] Best Intrusion Detection System (IDS) Software[28] and Best Network Detection and Response (NDR) Solutions[29] by PeerSpot (formerly IT Central Station)
  • 2021 named to CRN's 20 Coolest Security Companies as part of their annual security 100 list and received a 5-star rating in the 2021 CRN Partner Program Guide..[30]
  • 2021 Best Tech Startups in San Jose by the Tech Tribune.[25]
  • 2020 finalist as a Security Trailblazer in the Microsoft Security 20/20 award.[31]
  • 2020 CISO50 & Future Security Awards: Winner in the Network Detection & Response vendor category[32]
  • 2020 Finalist in the Network Security category for the CISO Choice Awards.[33]
  • 2020 Computing Security Excellence Awards: Finalist in “Enterprise Threat Detection”, “Security Automation” categories and Winner of the “Network Security" Award.[34]
  • 2020 Award for Best Security Innovation in a SaaS Product from the SaaS Awards[35]
  • 2020 SC Awards Europe Winner for Best Customer Service, named as Highly Recommended in the Best Behaviour Analytics/Enterprise Threat Detection category and Finalist for Best Use of Machine Learning/AI.[36]
  • 2020 Silver Edison Award in the Innovative Services category for Security and Compliance Platforms[37]
  • 2020 Cybersecurity Excellence Awards - Series of Gold Awards for Threat Hunting, Security Analytics, AWS Cloud Security, Threat Detection Intelligence and Response, Artificial Intelligence Security, Silver Award for Security Automation and Bronze Award for Best Cybersecurity Company.[38]
  • 2020 Cyber Defense Magazine Infosec Awards - Next Gen Category for "Cloud Security" and "Artificial Intelligence and Machine Learning"
  • 2019 Deloitte 2019 Technology Fast 500 winners[39]
  • 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)[40]
  • 2019 The Hot 150 Cybersecurity Companies[41]
  • 2019 Stratus Awards for Cloud Computing[42]
  • 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection[43]
  • 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution[44]
  • 2019 The Software Report: Top 25 Women Leaders in Cybersecurity[45]
  • 2019 Red Herring Top 100 Global Winner[46]
  • 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli[47]
  • 2019 CRN Security 100[48]
  • 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems[49]

References

  1. "Contact Vectra". https://www.vectra.ai/about/contact. 
  2. "Vectra Recall overview". Vectra. https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5cae82a490434c84422d5317_BR-Cognito-Stream-Overview-041019.pdf. 
  3. "Vectra Recall overview". Vectra. https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a779c6d18ff3ccf94d55_BR-Cognito-Recall-Overview-040519.pdf. 
  4. "Vectra Detect overview". Vectra. https://assets.website-files.com/5bc662b786ecfc12c8d29e0b/5ca7a811c6d18f56cdf96582_HO-Cognito-Platform-Overview-040519.pdf. 
  5. "AI is changing SecOps: What security analysts need to know". TechBeacon. https://techbeacon.com/security/ai-changing-secops-what-security-analysts-need-know. 
  6. Maiwald, Eric. "Network Behavior Analysis: Moving Beyond Signatures". https://www.gartner.com/doc/1405498/network-behavior-analysis-moving-signatures. 
  7. "System for implementing threat detection using threat and risk assessment of asset-actor interactions". https://patents.google.com/patent/US10050985B2/en?oq=10050985. 
  8. "Method and system for detecting bot behavior". https://patents.google.com/patent/US9930053B2/en?oq=9930053. 
  9. "Method and system for generating durable host identifiers using network artifacts". https://patents.google.com/patent/US9847968B2/en?oq=9847968. 
  10. "System for implementing threat detection using daily network traffic community outliers". https://patents.google.com/patent/US10033752B2/en?oq=10033752. 
  11. "Method and system for detecting threats using metadata vectors". https://patents.google.com/patent/US9853988B2/en?oq=9853988+. 
  12. "Method and system for detecting algorithm-generated domains". https://patents.google.com/patent/US9807110B2/en?oq=9807110. 
  13. "System for detecting threats using scenario-based tracking of internal and external network traffic". https://patents.google.com/patent/US9900336B2/en?oq=9900336. 
  14. "Method and system for detecting threats using passive cluster mapping". https://patents.google.com/patent/EP3221793B1/en?oq=EP3221793. 
  15. "Systems and methods for capturing, replaying, or analyzing time-series data". https://www.google.com/patents/US9237164. 
  16. "Systems and methods for capturing, replaying, or analyzing time-series data". https://www.google.com/patents/US9407647. 
  17. "System and method for detecting network intrusions using layered host scoring". https://www.google.com/patents/US20150264061. 
  18. "Detecting network reconnaissance by tracking intranet dark-net communications". https://www.google.com/patents/US20150264078. 
  19. "Malicious relay detection on networks". https://www.google.com/patents/US9628512. 
  20. "#Privacy: Research reveals that RDP remains a popular technique for cyberattackers". PrivSec Report. https://gdpr.report/news/2019/09/26/privacy-research-reveals-that-rdp-remains-a-popular-technique-for-cyberattackers/. 
  21. "Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure". Venture Beat. https://venturebeat.com/2019/08/07/vectra-ransomware-attacks-are-spreading-to-cloud-data-center-and-enterprise-infrastructure/. 
  22. "Energy Sector's IT Networks in the Bulls-Eye". Dark Reading. https://www.darkreading.com/analytics/energy-sectors-it-networks-in-the-bulls-eye/d/d-id/1333201. 
  23. "University Networks Become Fertile Ground for Cryptomining". Dark Reading. https://www.darkreading.com/attacks-breaches/university-networks-become-fertile-ground-for-cryptomining-/d/d-id/1331399. 
  24. "University Networks Become Fertile Ground for Cryptomining". SC Magazine. https://www.scmagazineuk.com/cyber-attackers-use-hidden-tunnels-pilfer-data-financial-service-firm/article/1486693. 
  25. 25.0 25.1 "2022 Best Tech Startups in San Jose". https://thetechtribune.com/10-best-tech-startups-in-san-jose/. 
  26. "SC Awards Europe 2021". https://www.scawardseurope.com/Result. 
  27. "Best Network Traffic Analysis (NTA) Tools". https://www.peerspot.com/categories/network-traffic-analysis-nta. 
  28. "Best Intrusion Detection and Prevention Software (IDPS)". https://www.peerspot.com/categories/network-traffic-analysis-nta. 
  29. "Best Network Detection and Response (NDR) Software". https://www.peerspot.com/categories/network-detection-and-response-ndr. 
  30. "CRN website". https://www.crn.com/partner-program-guide/ppg2021-details.htm?c=258. 
  31. "Finalists announced in second annual Microsoft Security 20/20 awards". https://www.microsoft.com/security/blog/2021/03/11/finalists-announced-in-second-annual-microsoft-security-20-20-awards/. 
  32. "CISO50 and Future Security Awards 2020: winners revealed". https://www.tahawultech.com/industry/technology/ciso-50-and-future-security-awards-2020-winners/. 
  33. "CISO Choice Awards™ 2020". https://securitycurrent.com/ciso-choice-awards/. 
  34. "2020 Computing Security Excellence Awards list". https://event.computing.co.uk/securityexcellence/en/page/2020-finalists. 
  35. "The SaaS Awards is pleased to announce the winners of the 2020 program". https://www.cloud-awards.com/2020-software-awards-shortlist/. 
  36. "2020 Cybersecurity Product / Service Awards – Winners and Finalists". https://cybersecurity-excellence-awards.com/2020-cybersecurity-product-awards-winners-and-finalists/. 
  37. "2020 EDISON BEST NEW PRODUCT AWARDS™ WINNERS". https://edisonawards.com/winners2020.php. 
  38. "2020 Cybersecurity Product / Service Awards – Winners and Finalists". https://cybersecurity-excellence-awards.com/2020-cybersecurity-product-awards-winners-and-finalists/. 
  39. "2019 Technology Fast 500". Deloitte. https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/fast500-winners.html. 
  40. "2019 computing Security Excellence Awards". computing. https://events.computing.co.uk/securityexcellence. 
  41. "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Cybersecurity Ventures. https://cybersecurityventures.com/cybersecurity-companies-list-hot-150/#hot-150/?view_15_per_page=150&view_15_page=1. 
  42. "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Business Intelligence Group. https://www.bintelligence.com/stratus-awards. 
  43. "2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)". SC Media Europe. https://www.scawardseurope.com/results-2019/. 
  44. "2019 American Business Association Awards". American Business Association. https://stevieawards.com/aba/product-management-new-product-awards. 
  45. "2019 The Software Report: Top 25 Women Leaders in Cybersecurity". The Software Report. https://www.thesoftwarereport.com/top-25-women-leaders-in-cybersecurity-of-2019/. 
  46. "Red Herring Top 100 Global Winner". Red Herring. https://www.redherring.com/2018-red-herring-top-100-global-winners/. 
  47. "Honoring Achievements in Artificial Intelligence". AI Intelligence Awards. https://www.bintelligence.com/artificial-intelligence-excellence-awards. 
  48. "Vectra Recognized on CRN's 2019 Security 100 List". CRN. https://www.vectra.ai/news/vectra-recognized-on-crns-2019-security-100-list. 
  49. Craig Lawson, Claudio Nevia. "Magic Quadrant for Intrusion Detection and Prevention Systems". https://www.gartner.com/doc/3844163/magic-quadrant-intrusion-detection-prevention.