about - Media coverage

Media coverage published in 2015

Forbes hottest cybersecurity startups of 2015

December 29, 2015

Forbes

In 2015, there were few hotter areas in Silicon Valley than cybersecurity, and Vectra ranked in the top 10 of that competitive group.

Read article

Uncovering covert attack communications inside your network

December 24, 2015

InfoSecurity

Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

Read article

Hello Kitty fixes website security flaw

December 23, 2015

Cloud Pro

Sanrio says the loophole that provided an attack entry method potentially allowing cyber criminals to bypass traditional security defences in order to enter and exploit internal systems with the appearance of a legitimate user, has been closed and data is now safe.

Read article

Algorithms are the key to detecting and mitigating cyber attacks

December 23, 2015

Security News Desk

Gerard Bauer, vice president of EMEA sales at Vectra, shares his security predictions for 2016.

Read article

Automated threat detection helps fulfill protection goals of critical security controls

December 22, 2015

Homeland Security Today

New technologies, such as machine learning, have evolved to help organizations improve their response to modern attacks. Although the financial industry has been using machine learning since the 1970s to detect fraudulent behavior, use of machine learning in the information security sector is a recent phenomenon.

Read article

Cybersecurity in virtual networks

December 18, 2015

VMblog.com

In this eighth annual VMblog.com series exclusive, virtualization and cloud executives share their predictions for 2016.

Read article

Protecting the university network and flagging attacks — in real time

December 15, 2015

Education Dive

Higher education is a key target for cyber attacks because of the open networks common on college and university campuses. Thousands of students and faculty wander on and off the network with their own devices, bringing viruses and malware to the wider community and creating nightmares for security teams.

Read article

SANS Institute shows true power of automated threat detection

December 14, 2015

Cloud Security Resource

A SANS Institute report, backed with findings from Vectra, explains how an automated threat detection system that combines behavioral analysis, data science and machine learning can help organizations meet Critical Security Control (CSC) mandates.

Read article

The state of cybersecurity: What 2016 will bring

December 14, 2015

ITProPortal

In 2016, what organisations need are tools that identify the activities of the attacker inside a network before a data breach occurs, with a focus on how to quickly intervene, minimise the time they are exposed and reduce the impact of cyberthreats.

Read article

How one university addresses targeted attacks in progress

December 14, 2015

University Business

Hernan Londono, associate CIO at Barry University in Miami, talks about embracing campus mobility and BYOD, and explains why a strong Advanced Persistent Threat (APT) defense is vital to protecting the university's network from mobile devices that it doesn't own or manage.

Read article

Data science, machine learning and behavioral analysis help identify new security threats

December 8, 2015

Campus Technology

Automated network threat detection tools that use data science, machine learning and behavioral analysis work with perimeter security to help organizations meet security goals defined in the CIS Critical Security Controls recommendations and protect against attackers, according to a new report from the SANS Institute.

Read article

Fleeting strategic importance? 2016, the year of the CISO

December 7, 2015

IDG Connect

The core view of most of the experts we spoke to was that, while it is not clear if there is a higher number of CISOs now, these individuals are definitely gaining a stronger position within the business.

Read article

Detecting and preventing cyberattacks in your network

December 7, 2015

University Business

Despite being vulnerable to cyberattacks, many universities still have insufficient threat management defenses. Attackers can easily evade perimeter security defenses and spy, spread and steal for the better part of a year, undetected. In the process, they'll take vital research data, personal info and financial records from campus community members.

Read article

Nothing's sacred: VTech hackers stole kids photos and chat histories

December 1, 2015

SC Magazine

VTech hackers purportedly made off with millions of pieces of customer information and have now been revealed to have stolen photos and private chat histories, too. VTech sold an app called Kid Connect that lets parents use their smartphones to talk to their kids through their VTech devices.

Read article

The exploitation game

November 30, 2015

Computing Security

What steps can be taken to detect and block exploits that take advantage of software vulnerabilities? And how can security teams better understand the behaviour of legitimate software components? Preventing the exploitation of software vulnerabilities is desirable but their detection is a must for organisations and their security teams.

Read article

Detecting and preventing cyberattacks in your network

November 30, 2015

University Business

Officials from Vectra Networks and Barry University in Miami discuss insufficient cyber attack defenses at many colleges, despite existing vulnerabilities. They also discuss new defense-in-depth models that quickly pinpoint and mitigate threats in progress and share security strategies that enable mobility as well as open and collaborative learning.

Read article

Why ransomware is not going away any time soon

November 30, 2015

SecurityWeek

Ransomware is targeting enterprise networks with a vengeance. In addition to user hard drives, it's been increasingly successful at encrypting file-shares and network drives. Consequently, ransomware has evolved from a mere nuisance to a potentially debilitating attack that holds critical business assets and intellectual property hostage.

Read article

VTech Holdings: Data from 5 million customer accounts breached

November 30, 2015

Wall Street Journal

VTech, maker of electronic toys for kids, said that 5 million of its customer accounts were leaked in a data breach that accessed user names, birthdays and passwords but not their credit card or personally identifiable information. Company officials noted that the breach was mounted by an "unauthorized party."

Read article

Vectra wins 2015 Computer Technology Review Most Valuable Product award

November 24, 2015

Computer Technology Review

Vectra advanced persistent threat (APT) security software was chosen by the Computer Technology Review editorial panel based on rigorous judging criteria that included product innovation, functionality and affordability.

Read article

No signatures required

November 21, 2015

ITProPortal

However, the most dangerous threat to data, user and system security is not the known known, but rather the unknown unknowns – the threats that have yet to be captured in the wild and mapped. We don’t know if they exist, we don’t have visibility into what they do, and there’s no way signatures can catch them.

Read article

GSN announces winners and finalists in 2015 Homeland Security Awards

November 17, 2015

Government Security News

Government Security News is pleased to announce that Vectra has been named a finalist in its seventh annual Homeland Security Awards for Best Threat Intelligence Solution.

Read article

The Internet of Things is making oil production vulnerable to hacking

November 17, 2015

Motherboard

The oil and gas industry is caught in a slump, with prices going up and down and profits in decline. But it faces another major problem that's gotten less attention: Cyber attacks could threaten industry stability and worker safety.

Read article

A look at real risks to school networks, with a level-headed security approach

November 16, 2015

EdTech Digest

Unlike vendors that attempt to make every piece of malware sound like the end of the world, it is important to show IT security teams which threats actually pose the greatest risks to the university.

Read article

Vectra helps organizations identify intruders that are already in their networks

November 16, 2015

infoTECH Spotlight

Most security solutions have one at-bat, yet attackers can typically survive undetected in a network for around 225 days, says Vectra’s Mike Banic. “Every network has likely been hacked, but they just don’t know it yet,” he says.

Read article

Video: Top Vectra executive talks about cyber security with TMCnet editors

November 14, 2015

TMCnet

Vice president of marketing Mike Banic shares the company's latest developments and discusses its recent advancements in the real-time detection of in-progress cyber attacks that spread inside networks.

Read article

Branch offices are more than a remote risk to network security

November 13, 2015

Computer Technology Review

While remote offices, clinics, bank branches and retail locations are critical to business success, they often lack the same security protections found at the headquarters or data center locations.

Read article

Vectra is among 16 technology innovators at SINET

November 13, 2015

Ulitzer

The capstone event of SINET is its yearly innovation showcase in Washington, D.C., the last of which was held Nov. 3-4. The showcase brought together innovative solutions from 16 firms, including Vectra, selected by a collective of seasoned judges.

Read article

Can we protect data without prying?

November 11, 2015

InfoSecurity

Are cybersecurity and privacy mutually exclusive, or is it possible to have both? Oliver Tavakoli, CTO of Vectra Networks, offers a quick analysis of the commercial solutions available from well-known cybersecurity suppliers to provide valuable insight.

Read article

Cybersecurity students learn by hacking at RIT Collegiate Pentesting Competition

November 11, 2015

RIT University News

Rochester Institute of Technology is already planning its second Collegiate Pentesting Competition after the success of its first annual event held Nov. 7–8 in Rochester, N.Y. Teams from nine regional universities faced-off at RIT as they broke into computer networks, evaluated their weak points and presented plans to better secure them.

Read article

Vectra sponsors collegiate competition to battle cyber threats

November 3, 2015

PRWeb

A new competition at Rochester Institute of Technology allows students to attack the problem of cyber security from a different perspective. Instead of defending themselves against attackers, as other cyber threat competitions do, these students create a full-fledged plan of attack and launch it against a network.

Read article

TalkTalk reveals extent of data hack, second teen arrested

October 30, 2015

Energy & Technology Magazine

Two teens arrested after being implicated in the attack on internet service provider TalkTalk in which 1.2 million customer details were stolen last week.

Read article

Putting on the cyber shift: How to adapt to advanced strategies

October 28, 2015

infoTECH Spotlight

Cyber attackers are moving laterally inside networks and using hidden tunnels of encrypted traffic to get around. The encrypted traffic that protects data within modern applications – such as SharePoint, Exchange, Salesforce.com, and Google Apps – creates a blind spot that can be exploited by advanced threats and malware.

Read article

Breach analytics: The next billion-dollar investment opportunity

October 24, 2015

VentureBeat

Vectra takes the network analytics approach, proposing to weave together data via machine learning to surface anomalous behaviors and even anticipate an attacker’s next move.

Read article

TalkTalk receives ransom demand following website hack

October 23, 2015

Wall Street Journal

TalkTalk Telecom Group PLC said Friday it has received a ransom demand from someone claiming responsibility for a criminal hack of its website that could have resulted in the theft of data from its database.

Read article

Expert comment: TalkTalk cyber breach

October 23, 2015

IDG Connect

For the third time, UK telecoms provider TalkTalk has fallen victim to a cyber-breach and there could be as many as four million customers affected.

Read article

Cyber security experts react to TalkTalk breach

October 23, 2015

Threat Intelligence Times

In the wake of news that TalkTalk have suffered their third serious data breach in a year, industry experts have lined up to express concern at the company’s blasé attitude toward cyber security.

Read article

Oil and gas industry must face the challenges of cyber safety

October 18, 2015

Houston Chronicle

Cyber threats to the oil and gas industry infrastructure are potentially more serious than the breaches where hackers capitalize on stolen personal, health care or financial information. Nation states and foreign businesses have motivations to carry out cyber attacks with potentially crippling global consequences.

Read article

Vectra Networks comments on Dridex malware threat

October 14, 2015

Security News Desk

The National Crime Agency has issued a warning that a new version of the Dridex malware is targeting the UK, with £20 million having already been purported stolen by this attack.

Read article

EC3 in cooperative action to target Dridex banking malware

October 14, 2015

SC Magazine

EC3, NCA, FBI and a range of other bodies have targeted the Dridex banking malware, including using a sinkhole operation to sever communications between infected botnets and their controlling cyber-criminals.

Read article

Barry University gets smart about cyber security

October 14, 2015

Baseline

The university turns to Vectra for a real-time cyber-attack detection system that uses data science, machine learning and behavioral analysis to detect attacks in progress.

Read article

Taking stock: Ranking the next bllion-dollar cybersecurity markets

October 14, 2015

RSA Conference

Venky Ganesan, managing director at Menlo Ventures, writes, “I believe there will be significant winners…notably those that reduce false positives and prioritize workflows for better incident response and remediation. Among the early leaders are companies such as Exabeam, LightCyber, Securonix and Vectra Networks."

Read article

Adobe patches many flaws in Flash Player, Acrobat, Reader

October 13, 2015

SecurityWeek

Updates released on Tuesday by Adobe for Flash Player, Reader and Acrobat address a significant number of vulnerabilities that expose the users of these products to hacker attacks. The work of experts from Vectra Networks has been acknowledged in finding and reporting vulnerabilities.

Read article

Jackson Health System to present cyber attack prevention at ITxpo

October 2, 2015

mHealth Times

Vectra customer Jackson Health System will speak at the Gartner Symposium/ITxpo 2015 event next week. Jackson Health System CISO Connie Barrera will present “Protecting Health Organizations from Cyber Attacks” on Oct. 6 at 3:50 p.m. EDT in the Europe 8 Conference Room of the Walt Disney World Dolphin hotel in Orlando, Florida.

Read article

SINET names Vectra a top cybersecurity innovator

October 1, 2015

Business Wire

SINET, an organization focused on advancing cybersecurity innovation through public and private sector collaboration, today announced the winners of its annual SINET 16 Innovator competition, including Vectra Networks.

Read article

Vectra raises $35 million in sizzling cyber security investment market

September 30, 2015

Silicon Valley Business Journal

Vectra Networks raised $35 million in equity funding on Tuesday. DAG Ventures led the round with participation from all existing investors including Khosla Ventures, Accel Ventures, IA Ventures, AME Cloud Ventures, Intel Capital and Juniper Networks.

Read article

The unintended attack surface of the Internet of things

September 29, 2015

Dark Reading

While consumer Wi-Fi products may seem like an odd choice for intensive threat research, Vectra Threat Labs found that vulnerabilities in consumer and Internet of Things gear can end up having a much larger impact on enterprise security than you might think.

Read article

Value-added distributor Cloud Distribution teams up with Vectra in the UK

September 29, 2015

Channel Pro

Distributor Cloud Distribution has reached an agreement with Vectra Networks to provide the vendor’s security products to the channel. Cloud Distribution says it will help grow the Silicon Valley firm’s presence in the UK and forge relationships with new partners to drive revenue growth.

Read article

Vectra signs Cloud Distribution as a value-added distributor in the UK

September 29, 2015

CRN

Cloud Distribution has inked a deal with cybersecurity vendor Vectra Networks as the US player launches in the UK.

Read article

Barry University adopts anti-cyber attack measures

September 29, 2015

Campus Technology

Barry University, a 9,000-student Catholic university in Miami, has signed Vectra Networks to protect its data and networks from cyber attacks.

Read article

Barry University stops cyber attack in progress with Vectra

September 29, 2015

CIO Today

Barry University has selected Vectra to protect its high-value data Relevant Products/Services as advanced persistent attacks (APTs) surge. Vectra’s automated threat management solution enables the university to detect cyber attacks as they are happening – automatically and in real time.

Read article