Vectra AI, Inc. is a cybersecurity company headquartered in
San Jose, California
San Jose, officially San José (; ; ), is a major city in the U.S. state of California that is the cultural, financial, and political center of Silicon Valley and largest city in Northern California by both population and area. With a 2020 popul ...
.
History
Vectra was founded in 2010 as TraceVector LLC in New York City and was incorporated in 2012 under the name Vectra Networks.
Products
The Cognito platform from Vectra provides continuous, automated threat surveillance designed to expose cyberattacks that actively spread inside networks.
Threat behaviors and cyberattack techniques detected by Cognito include
botnet
A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
command-and-control communications,
botnet
A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
monetization, internal reconnaissance, lateral movement, and
data theft Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, su ...
, or exfiltration.
Vectra offers three applications on the Cognito platform to address use cases:
* Cognito Stream delivers enterprise-scale network metadata with security insights in Zeek format to data lakes and security information and event management (SIEM) applications without the complexity, constant tuning and scale limitation of open-source Zeek.
* Cognito Recall gives security analysts a logical starting point to perform AI-assisted threat hunting and conclusive incident investigations.
* Cognito Detect automates the real-time detection of hidden attackers in cloud and data center workloads and user and internet-of-things devices.
Using AI for incident detection and triage in its security operations center has helped one Vectra customer
Texas A&M University System
The Texas A&M University System is a state university system in Texas and is one of the state's six independent university systems.
The Texas A&M University System is one of the largest systems of higher education in the United States, with a bu ...
resolve an incident.
Technology
Vectra AI combines data science, machine learning and network behavioral analysis technologies to identify patterns that characterize malicious behavior within a network.
Cognito uses
artificial intelligence
Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
, including
supervised learning
Supervised learning (SL) is a machine learning paradigm for problems where the available data consists of labelled examples, meaning that each data point contains features (covariates) and an associated label. The goal of supervised learning alg ...
,
unsupervised machine learning
Unsupervised learning is a type of algorithm that learns patterns from untagged data. The hope is that through mimicry, which is an important mode of learning in people, the machine is forced to build a concise representation of its world and t ...
, and
deep learning
Deep learning (also known as deep structured learning) is part of a broader family of machine learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi-supervised or unsupervised.
De ...
techniques, to detect and respond to advanced cyberattacks. Remediation actions are taken with
security information and event management
Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time ana ...
(SIEMs),
firewalls,
endpoint security
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, Internet-of-things devices, ...
enforcement,
network access control
Network access control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security ...
, and orchestration, which are integrated with Cognito via an
application programming interface
An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how t ...
.
Vectra was issued ten U.S. patents for advanced cyber security analytics capabilities automated by AI:
* 10050985
* 9930053
* 9847968
* 10033752
* 9853988
* 9807110
* 9900336
* EP3221793
* 9237164
* 9407647
* 9565208
* 9602533
* 9628512
Attacker Behavior Industry Reports
Vectra publishes Attacker Behavior Industry Reports, which provide an analysis of active and persistent attacker behaviors inside the enterprise networks of Vectra customers. The reports examine a wide range of cyberattack detections and trends from 300+ Vectra customers from nine different industries. The reports span all strategic phases of the attack lifecycle.
* "90% of organisations deploying Remote Desktop Protocol (RDP) exhibited RDP attacker behaviour."
* "The most significant ransomware threat—in which hackers steal your data and hold it for ransom—is malicious encryption of shared network files in cloud service providers."
* "Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.”
* "Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks."
* "Sophisticated cyber-attackers are using hidden tunnels to spy on financial firms and pilfer sensitive data and personally-identifiable information (PII) - and they're doing it at a higher rate than in other industries."
Awards and honors
Vectra and its customers have received industry recognition, including:
* 2022 Best Tech Startups in San Jose by the Tech Tribune.
* 2021 SC Awards Europe: shortlisted in the category of Best Use of Machine Learning and AI.
* 2021 recognized as a leader in the Best Network Traffic Analysis (NTA) Solutions, Best Intrusion Detection System (IDS) Software and Best Network Detection and Response (NDR) Solutions by PeerSpot (formerly IT Central Station)
* 2021 named to CRN's 20 Coolest Security Companies as part of their annual security 100 list and received a 5-star rating in the 2021 CRN Partner Program Guide.
* 2021 Best Tech Startups in San Jose by the Tech Tribune.
* 2020 finalist as a Security Trailblazer in the Microsoft Security 20/20 award.
* 2020 CISO50 and Future Security Awards: Winner in the Network Detection & Response vendor category
* 2020 Finalist in the Network Security category for the CISO Choice Awards.
* 2020 Computing Security Excellence Awards: Finalist in “Enterprise Threat Detection”, “Security Automation” categories and Winner of the “Network Security" Award.
* 2020 Award for Best Security Innovation in a SaaS Product from the SaaS Awards
* 2020 SC Awards Europe Winner for Best Customer Service, named as Highly Recommended in the Best Behaviour Analytics/Enterprise Threat Detection category and Finalist for Best Use of Machine Learning/AI.
* 2020 Silver Edison Award in the Innovative Services category for Security and Compliance Platforms
* 2020 Cybersecurity Excellence Awards Series of Gold Awards for Threat Hunting, Security Analytics, AWS Cloud Security, Threat Detection Intelligence and Response, Artificial Intelligence Security, Silver Award for Security Automation and Bronze Award for Best Cybersecurity Company.
* 2020 Cyber Defense Magazine Infosec Awards Next Gen Category for "Cloud Security" and "Artificial Intelligence and Machine Learning"
*2019 Deloitte 2019 Technology Fast 500 winners
* 2019 computing Security Excellence Awards: Enterprise Threat Detection (Finalist) and Most Innovative AI/ML Security Solution (Finalist)
* 2019 The Hot 150 Cybersecurity Companies
* 2019 Stratus Awards for Cloud Computing
* 2019 SC Awards Europe: Highly Commented for Best Use of Machine Learning, Best Behavior Analytics and Enterprise Threat Detection
* 2019 American Business Association Stevie Awards: Best Artificial Intelligence and Machine Learning Solution
* 2019 The Software Report: Top 25 Women Leaders in Cybersecurity
* 2019 Red Herring Top 100 Global Winner
* 2019 Artificial Intelligence Excellence Awards: Vectra Cognito Platform and Chief Technology Officer Oliver Tavakoli
* 2019 CRN Security 100
* 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems
[{{cite web, last1=Craig Lawson, first1=Claudio Nevia, title=Magic Quadrant for Intrusion Detection and Prevention Systems, url=https://www.gartner.com/doc/3844163/magic-quadrant-intrusion-detection-prevention, website=Gartner, access-date=16 April 2018]
References
Companies based in San Jose, California
American companies established in 2012
Computer security companies
Networking companies of the United States
AI companies