about - Media coverage

Media coverage published in 2014

Data science and machine learning will fight cyber-attacks, says Vectra Networks: 2015 Tech Predictions

December 31, 2014

SiliconANGLE

Vectra VP of Marketing Mike Banic predicts data science and machine learning will become the focus of the fight on cyber-attacks, cyber security will get social, and new entrants will continue to disrupt the cyber security market.

Read article

Vectra X-series platform identifies threats in real-time

December 22, 2014

eWeek

Real-time cyber-attack detector Vectra Networks has introduced a real-time detection platform for insider and targeted threats.

Read article

New products of the week 12.22.2014

December 22, 2014

Network World

Our roundup of intriguing new products from companies such as Dell, CloudBerry and Vectra (See Slide 16).

Read article

Breach detection, Sony Entertainment and Vectra Networks

December 19, 2014

EMA Blogs

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year.

Read article

Vectra releases real-time threat detection platform to protect against targeted attacks

December 15, 2014

PCC Mobile Broadband

Vectra Networks has released an updated real-time detection platform – X-series platform – aimed for insider and targeted threats detection.

Read article

Put the insider threat in your sights

December 15, 2014

InfoTech

Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations.

Read article

Vectra launches real-time detection platform to curb insider threats

December 11, 2014

Homeland Security Today

Vectra Networks announced release of a real-time detection platform to protect organizations and government agencies from insider and target threats.

Read article

Vectra updates threat detection platform

December 10, 2014

SecurityWeek

The Vectra X-series platform is designed to detect sophisticated threats by using a combination of security research, data science and machine learning. According to the company, the product is capable of detecting attacks on all operating systems, applications and devices regardless of the method and location of the initial delivery.

Read article

Vectra launches real-time threat detection

December 10, 2014

The VAR Guy

Vectra Networks has released its updated X-series platform, the first real-time detection solution designed to discover insider and targeted threats. The new platform promises to help organizations gain instant visibility into potential threats by leveraging a combination of dynamic community threat analysis and real-time detection of cyberattacks.

Read article

Video: Tracking cyber threats from inside a company

December 10, 2014

Bloomberg TV's Taking Stock

CEO Hitesh Sheth tells Bloomberg TV's Pimm Fox how Community Threat Analysis dynamically creates a clear picture of typical network access through the entire corporate network, identifying anomalies and flagging unauthorized access to documents, data and intellectual property, making it an effective way of recognizing insider attacks.

Read article

Review: Vectra X-series prevents data breaches with AI

December 9, 2014

Enterprise Networking Planet

Frank Ohlhorst details how data breaches happen and what Vectra’s X-series security appliances can do to detect and prevent them.

Read article

An epic ride: A look back at the ever-changing information security industry

December 8, 2014

SC Magazine

“We've gone from an environment where people were essentially stationary with fixed computing assets to one where everything is porous and people are mobile and applications and data and information are all in the cloud,” says Hitesh Sheth, president and CEO for Vectra Networks.

Read article

Industry reactions to devastating Sony hack

December 5, 2014

SecurityWeek

The systems of entertainment giant Sony have been hacked once again, and although the full extent of the breach is not yet known, the incident will likely be added to the list of most damaging cyberattacks.

Read article

The inner workings of a targeted attack

December 1, 2014

TechRepublic

Vectra Networks' X-series of appliances combine advanced analytics with AI to identify threats in real time.

Read article

Vectra post-breach report reveals attacker habits

November 25, 2014

The VAR Guy

Ten percent of hosts experience at least one or more cyberattacks that bypass enterprise security perimeter defenses, according to a new study by security solution provider Vectra Networks.

Read article

NotCompatible mobile malware gets badder

November 21, 2014

LinuxInsider

The new "C" version of the NotCompatible malware that targets Android devices is very difficult to stop – but it's not that hard to avoid.

Read article

Targeted attacks cause damage in multiple ways

November 14, 2014

eWeek

Overall, 15 percent of hosts in the participating organizations experienced a targeted attack, according to a Vectra Networks report.

Read article

Survey roundup: False sense of security?

November 14, 2014

Wall Street Journal

A report by data security company Vectra Networks looks at how cybercriminals bypass perimeter defenses, andwhat they do inside a network once they have gained access.

Read article

Feedback Friday: Executives targeted in 'darkhotel' attacks

November 14, 2014

SecurityWeek

When it comes to the darkhotel issue and the fast-evolving threat landscape, "what the malware is doing" is more important than "what the malware is."

Read article

U.S. Postal Service employees, retirees, customers exposed in hack attack

November 11, 2014

Tech News World

There's speculation that China might be behind a months-long hack attack that breached USPS servers, compromising personal data of workers and customers.

Read article

What attackers do after bypassing perimeter defenses

November 6, 2014

Help Net Security

Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass perimeter defenses, and what attackers do once inside networks.

Read article

Study: Organizations assailed by cyber attacks, 15 percent are targeted

November 6, 2014

SC Magazine

Highly organized, sophisticated and successful cyber attacks continue to assail organizations and while most are opportunistic, a higher than expected percentage are targeted, according to results from a recent study.

Read article

From malware to breach

November 6, 2014

Dark Reading

Got malware? More than likely you do, but don't panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new study of real-world breaches has found.

Read article

BYOD and other hazards

November 6, 2014

GARP

Mobile technologies can be a boon to productivity, but they also introduce cyber-security vulnerabilities that technologists and insurers are laboring to protect.

Read article

What attackers do after a breach

November 6, 2014

ISS Source

An attack happens and he or she is able to squeeze by the perimeter defense; that is just the beginning for an assault on a network, a new report shows.

Read article

Vectra report reveals what attackers do once they bypass perimeter defenses

November 5, 2014

InfoTech

This is the first report, using real-world data from the Vectra X-series platforms currently in production networks, that reveals what attackers do within a network once they evade perimeter defenses.

Read article

Some U.S. retailers shun Apple Pay, eye rival payments system

October 27, 2014

Reuters

Some large U.S. retailers are refusing to use Apple Inc's new electronic payments service as they commit to developing a rival payments system that would bolster their profits by eliminating credit card transaction fees.

Read article

Computer Technology Review Top 25 must-have software apps

October 27, 2014

Computer Technology Review

Every year Computer Technology Review ranks the top 25 software applications that you absolutely must check out. This year, new-comer Vectra Networks is in the mix.

Read article

Cyber security goes mobile

October 20, 2014

Institutional Investor

Mobile technology advances have brought about the once-unfathomable prospect that wireless security is at least on a par with traditional computing and networking systems – the very ones currently fending off an unprecedented wave of cyberattacks.

Read article

Detecting cyber attacks in a mobile and BYOD organization

October 14, 2014

Help Net Security

Explore the challenges, understand needs and evaluate mobile device management as an approach to detecting attacks. It can lead to a flexible, highly efficient solution that detects all phases of an active attack on mobile devices, regardless of device type, operating system or applications installed.

Read article

New bash bugs surface

September 29, 2014

Dark Reading

If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it's probably time to patch again, security experts warn.

Read article

Home Depot breach bigger than Target at 56 million cards

September 18, 2014

Reuters

Vectra CEO Hitesh Sheth says that the recent Home Depot breach exposes a serious security weakness, noting that the company said hackers used unique, custom-built malware to compromise up to 56 million payment cards.

Read article

Why breach detection is your new must-have cyber security tool

September 6, 2014

Tech Crunch

It's time for CIOs to start focusing on the next line of defense in the war against cyber crime: an emerging area called breach detection, which focuses on identifying long-tail intrusions after they happen and mitigating their damage, partly through the use of big-data technologies. Your company’s information security may depend on it.

Read article

Getting a clear picture of a computer network’s security

August 30, 2014

New York Times

Security experts say the only hope of protecting corporate networks from hackers is something the industry calls “defense in depth.” The phrase simply means that plugging in one traditional defense – antivirus software, or a firewall, is no longer going to cut it.

Read article

Vectra to use Series C to grow real-time cyber threat detection

August 27, 2014

Global Security Finance

Vectra Networks, Inc. announced on August 5 it had raised a new $25 million round of funding to boost sales and marketing for its behavior-based cyber security solution.

Read article

Cyber attacks: We're fighting an asymmetric war

August 26, 2014

Computer Technology Review

Cybercriminals' ability to attack is outpacing our ability to defend. We are fighting an asymmetric war. Resources are one challenge, but so are the defensive tactics. Organizations rely on security best practices and products that were developed to counter a different threat – long before the rise of mobility, the cloud and well-organized criminals.

Read article

Video: Bloomberg TV features Vectra in a discussion about security vulnerabilities in U.S. companies

August 19, 2014

Bloomberg TV

Vectra Networks CEO Hitesh Sheth and CrowdStrike CEO George Kurtz comment on the Chinese hackers that stole personal information from 4.5 million patients of Community Health Systems and discuss how vulnerable U.S. companies are to hackers. They speak with Pimm Fox on "Taking Stock."

Read article

Vectra raises $25 million to fend off cyberattacks in real time

August 5, 2014

Silicon Valley Business Journal

Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital.

Read article

Vectra detects cyberattacks in real-time, raises $25 million

August 5, 2014

VentureBeat

Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials.

Read article

Vectra raises $25 million to stop cyberattacks in progress

August 5, 2014

Wall Street Journal

Cybersecurity firms now recognize that cybercriminals are so good at penetrating corporate and government IT systems that they can no longer be entirely blocked. One of these firms, Vectra Networks, has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first.

Read article

Video: Bloomberg TV talks with Vectra CEO about cyber protection and privacy

August 5, 2014

Bloomberg TV

Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy.

Read article

Survey roundup: Culture change top compliance goal

July 25, 2014

Wall Street Journal

Ben DiPietro of the Wall Street Journal looks at recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn.

Read article

Three steps to a more secure BYOD program

July 25, 2014

FierceCIO

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds.

Read article

BYOD programs leave several security holes open

July 25, 2014

eWeek

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey.

Read article

How organizations deal with BYOD and mobile security

July 24, 2014

Help Net Security

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations.

Read article

More exploits expected to enter organizations via mobile devices

July 24, 2014

Mobile Marketing Watch

The second annual BYOD and Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal.

Read article

Is IT really ready for BYOD security challenges?

July 24, 2014

Network World

LinkedIn survey finds enterprise mobility still in infancy.

Read article

Vectra: 79 percent of organizations lack BYOD policies

July 23, 2014

MSPmentor

New study shows malware protection is a requirement for mobile security.

Read article

Firms turn blind-eye to BYOD policy

July 23, 2014

FierceMobileIT

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection.

Read article

Infosec pros worried BYOD ushers in security exploits, survey says

July 23, 2014

SC Magazine

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace.

Read article