Vectra AI

Vectra AI, Inc. applies artificial intelligence that detects and responds to hidden cyberattackers inside cloud, data center and enterprise networks.

Vectra AI
Privately Held
IndustryInformation Security
Founded2012 (2012) (incorporated)
FoundersMark Abene, James Harlacher, Marc Rogers, Ivan Wick [1]
Headquarters,
Area served
North America, Europe, Middle East, Africa, Australia/New Zealand, Japan and Asia-Pacific
Websitewww.vectra.ai

The company’s Cognito platform is designed to detect cyberattacker behaviors in these infrastructures and allow security analysts to conduct incident investigations and hunt for hidden threats using security-enriched metadata.

To augment the Cognito platform, Vectra threat researchers identify and investigate cyberattacks, vulnerabilities and malicious behaviors that are unknown to the world. With data sets from this research, data scientists develop the machine learning algorithms and behavioral analysis that drive the Cognito platform.

Investors in Vectra include Khosla Ventures, TCV, Accel Partners, IA Ventures, AME Cloud Ventures, DAG Ventures, Wipro Ventures, Atlantic Bridge, the Ireland Strategic Investment Fund, Nissho Electronics, and Silver Lake.

History

Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks. The company is headquartered in San Jose, Calif., with facilities in Austin, Texas, Boston, Mass., Ireland, Switzerland, Germany, the United Kingdom and France.[2]

Vectra’s team includes threat researchers, white hats, data scientists, security engineers, and user interface designers.

Key executives are Hitesh Sheth, president and chief executive officer; Jennifer Geisler, chief marketing officer; Oliver Tavakoli, chief technology officer; Howie Shohet, chief financial officer; Jodi Sutton, vice president of business operations; Jennifer Wang, vice president of customer success; Kevin Kennedy, vice president of product management; Jason Kehl, vice president of engineering; Aaron Bean, vice president of human resources; and Gerard Bauer, vice president of EMEA sales.

Board members include Hitesh Sheth, president and CEO of Vectra; Bruce Armstrong, operating partner, Kholsa Ventures; Kevin Dillon, co-founder and managing partner of Atlantic Bridge; Charles Giancarlo, CEO of Pure Storage; Brad Gillespie, general partner at IA Ventures; Tim McAdam, general partner TCV; Jim Messina, founder and CEO of the Messina Group; and Eric Wolford, venture partner at Accel Partners.

Products

The Cognito platform from Vectra provides continuous, automated threat surveillance to expose hidden and unknown cyberattackers that actively spread inside networks.

Cognito analyzes network traffic[3] in private data centers, public clouds and enterprise environments to detect hidden cyberattacker behaviors. The Cognito platform identifies and prioritizes all threat detections based on severity and certainty scores, which empowers IT security teams to prevent data loss by quickly mitigating the most serious attacks first.[4]

Threat behaviors and cyberattack techniques detected by Cognito include botnet command-and-control communications, botnet monetization, internal reconnaissance, lateral movement, and data theft, or exfiltration.

Vectra offers three applications on the Cognito platform to address use cases:

  • Cognito Stream delivers enterprise-scale network metadata enriched with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek. [5]
  • Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations. [6]
  • Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.[7]

Using AI for incident detection and triage in its security operations center has helped one Vectra customer – Texas A&M University System – resolve an incident in 10 to 20 minutes, rather than hours or days.[8]

Technology

Vectra AI combines data science, machine learning and network behavioral analysis technologies[9] to identify patterns that characterize malicious behavior within a network.

Cognito uses artificial intelligence, including supervised learning, unsupervised machine learning, and deep learning techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with security information and event management (SIEMs), firewalls, endpoint security enforcement, network access control, and orchestration, which are integrated with Cognito via an application programming interface.

Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI:

Attacker Behavior Industry Reports

Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle.

  • "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."[23]
  • "The most significant ransomware threat — in which hackers steal your data and hold it for ransom — is malicious encryption of shared network files in cloud service providers."[24]
  • "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”[25]
  • "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."[26]
  • "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."[27]

Awards and Honors

Vectra and its customers have received industry recognition, including:

  • 2020 Cyber Defense Magazine Infosec Awards - Next Gen Category for "Cloud Security" and "Artificial Intelligence and Machine Learning"[28] [random editor note: the source given below is a link to this very edition page. There must be something wrong]
  • 2019 Deloitte 2019 Technology Fast 500 winners[29]
  • 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)[30]
  • 2019 The Hot 150 Cybersecurity Companies[31]
  • 2019 Stratus Awards for Cloud Computing[32]
  • 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection[33]
  • 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution[34]
  • 2019 The Software Report: Top 25 Women Leaders in Cybersecurity[35]
  • 2019 Red Herring Top 100 Global Winner[36]
  • 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli[37]
  • 2019 CRN Security 100[38]
  • 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems[39]



  1. "Vectra AI Crunchbase". crunchbase.com. 2014-03-11. Retrieved 2014-05-17.
  2. "Contact Vectra". Vectra. Retrieved 16 April 2018.
  3. "The road rises up to meet Vectra Networks with $36 million in funding" (PDF). 451 Research. Retrieved 16 April 2018.
  4. "Vectra Networks". SDX Central. Retrieved 16 April 2018.
  5. "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
  6. "Vectra Recall overview" (PDF). Vectra. Retrieved 15 April 2019.
  7. "Vectra Detect overview" (PDF). Vectra. Retrieved 15 April 2019.
  8. "AI is changing SecOps: What security analysts need to know". TechBeacon. Retrieved 16 April 2018.
  9. Maiwald, Eric. "Network Behavior Analysis: Moving Beyond Signatures". Gartner. Retrieved 16 April 2018.
  10. "System for implementing threat detection using threat and risk assessment of asset-actor interactions". Retrieved 15 April 2019.
  11. "Method and system for detecting bot behavior". Retrieved 15 April 2019.
  12. "Method and system for generating durable host identifiers using network artifacts". Retrieved 15 April 2019.
  13. "System for implementing threat detection using daily network traffic community outliers". Retrieved 15 April 2019.
  14. "Method and system for detecting threats using metadata vectors". Retrieved 15 April 2019.
  15. "Method and system for detecting algorithm-generated domains". Retrieved 15 April 2019.
  16. "System for detecting threats using scenario-based tracking of internal and external network traffic". Retrieved 15 April 2019.
  17. "Method and system for detecting threats using passive cluster mapping". Retrieved 15 April 2019.
  18. "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
  19. "Systems and methods for capturing, replaying, or analyzing time-series data". Google Patents. Retrieved 16 April 2018.
  20. "System and method for detecting network intrusions using layered host scoring". Google Patents. Retrieved 16 April 2018.
  21. "Detecting network reconnaissance by tracking intranet dark-net communications". Google Patents. Retrieved 16 April 2018.
  22. "Malicious relay detection on networks". Google Patents. Retrieved 16 April 2018.
  23. "#Privacy: Research reveals that RDP remains a popular technique for cyberattackers". PrivSec Report. Retrieved 22 November 2019.
  24. "Vectra: Ransomware attacks are spreading to cloud, datacenter, and enterprise infrastructure". Venture Beat. Retrieved 22 November 2019.
  25. "Energy Sector's IT Networks in the Bulls-Eye". Dark Reading. Retrieved 22 April 2018.
  26. "University Networks Become Fertile Ground for Cryptomining". Dark Reading. Retrieved 22 April 2018.
  27. "University Networks Become Fertile Ground for Cryptomining". SC Magazine. Retrieved 22 April 2018.
  28. "View source for Vectra AI", Wikipedia, retrieved 2020-04-09
  29. "2019 Technology Fast 500". Deloitte. Retrieved 22 November 2019.
  30. "2019 computing Security Excellence Awards". computing. Retrieved 22 November 2019.
  31. "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Cybersecurity Ventures. Retrieved 22 November 2019.
  32. "Cybersecurity Ventures The Hot 150 Cybersecurity companies". Business Intelligence Group. Retrieved 22 November 2019.
  33. "2019 SC Awards Europe: Best Use of Machine Learning: Vectra Cognito (Highly Commended)". SC Media Europe. Retrieved 22 November 2019.
  34. "2019 American Business Association Awards". American Business Association. Retrieved 22 November 2019.
  35. "2019 The Software Report: Top 25 Women Leaders in Cybersecurity". The Software Report. Retrieved 22 November 2019.
  36. "Red Herring Top 100 Global Winner". Red Herring. Retrieved 22 November 2019.
  37. "Honoring Achievements in Artificial Intelligence". AI Intelligence Awards. Retrieved 15 April 2019.
  38. "Vectra Recognized on CRN's 2019 Security 100 List". CRN. Retrieved 15 April 2019.
  39. Craig Lawson, Claudio Nevia. "Magic Quadrant for Intrusion Detection and Prevention Systems". Gartner. Retrieved 16 April 2018.
gollark: https://osmarks.tk/p3.html#4-4
gollark: > This policy supersedes any applicable federal, national, state, and local laws, regulations and ordinances, policies, international treaties, legal agreements, illegal agreements, or any other agreements that would otherwise apply. If any provision of this policy is found by a court (or other entity) to be unenforceable, it nevertheless remains in force. This organization is not liable and this agreement shall not be construed. We are not responsible for any issue whatsoever at all arising from use of potatOS, potatOS services, anything at all, or otherwise.
gollark: > By using potatOS, agreeing to be bound by these terms, misusing potatOS, installing potatOS, reading about potatOS, knowing about these terms, knowing anyone who is bound by these terms, disusing potatOS, reading these terms, or thinking of anything related to these terms, you agree to be bound by these terms both until the last stars in the universe burn out and the last black holes evaporate and retroactively, arbitrarily far into the past. This privacy policy may be updated at any time and at all times the latest revision applies.
gollark: https://osmarks.tk/p3.html#4-1
gollark: Oh, and under clause 2.3 I *can* harvest your organs.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.