YOU + AI =
SECURITY THAT THINKS®

Introducing Cognito

Cognito transforms YOU into
a cybersecurity superhero.

 

Vectra is the world leader in applying AI to detect and hunt for cyberattackers

See how Cognito can transform you into a cybersecurity superhero

Vectra is the only Visionary in the Gartner 2018 Magic Quadrant for IDPS

RESEARCH

2018 Black Hat Edition of the Attacker Behavior Industry Report

The latest research from Vectra reveals a formidable increase in cyberattack behaviors across a wide range of industries.

GET THE REPORT

RESEARCH

2018 Spotlight Report: The risk of cyberattacks against manufacturing

Types of attacks launched against manufacturing organizations, the malicious intent behind them and the business risks.

GET THE REPORT

CASE STUDY

"Vectra saved the university system $7 million in a year," says Daniel Basile, executive director of the SOC at Texas A&M.

READ THE CASE STUDY

Blog

Choosing an optimal algorithm for AI in cybersecurity

by Sohrob Kazerounian

In the last blog post, we alluded to the No-Free-Lunch (NFL) theorems for search and optimization. While NFL theorems are criminally misunderstood and misrepresented in the service of crude generalizations intended to make a point, I intend to deploy a crude NFL generalization to make just such a point.

You see, NFL theorems (roughly) state that given a universe of problem sets where an algorithm’s goal is to learn a function that maps a set of input data X to a set of target labels Y, for any subset of problems where algorithm A outperforms algorithm B, there will be a subset of problems where B outperforms A. In fact, averaging their results over the space of all possible problems, the performance of algorithms A and B will be the same.

With some hand waving, we can construct an NFL theorem for the cybersecurity domain: Over the set of all possible attack vectors that could be employed by a hacker, no single detection algorithm can outperform all others across the full spectrum of attacks.

Events

Vectra in the news

Cyberattack risk for manufacturers outpaces other sectors
Industrial IoT escalates risk of global cyberattacks
Manufacturing firms craft cyberdefense for connected machines
Manufacturers have increased risk of cyberattacks

Industry Recognition