Marcus Hartwig

Director, Product Marketing

Marcus Hartwig is a director of product marketing manager at Vectra. Has been active in the areas of IAM, PKI and enterprise security for more than two decades. His past experience includes product marketing at Okta, co-funding a company in cybersecurity professional services, as well as managing a security product company – a combination that has left him passionate about all parts of product marketing, design and delivery.

All blog posts from this author

Cybersecurity

Vectra Named Key Part of Zero Trust Security Framework

July 21, 2021
Read blog post
Integration

MicrosoftとVectra AI社、SOCトライアド実現のために協業

June 9, 2020
Read blog post
Threat detection

5 Steps of an Actual Maze Ransomware Post Incident

January 5, 2021
Read blog post
Breach

MFA is Not Enough - Malicious OAuth Apps in Office 365 are Here to Stay

June 24, 2020
Read blog post
Cybersecurity

Insiders and Whistleblowers

September 8, 2020
Read blog post
Security operations

Why IDPS is Cumbersome and Hampers Security Personnel

August 25, 2020
Read blog post
Threat detection

Why IDPS Lacks the Capability to Detect Modern Attacks

August 18, 2020
Read blog post
Threat detection

Alert Fatigue and Bad Signatures Leads to Missed Attacks

August 11, 2020
Read blog post
Breach

Why Does Monitoring How Privileged Account Access is Used (and Abused) Matter?

July 19, 2020
Read blog post
Integration

Vectra and CrowdStrike Turn the Tables on Cyberattackers

October 15, 2020
Read blog post
Security operations

Why the NIST Zero Trust Architecture No Longer Requires Decryption

January 14, 2021
Read blog post
Security operations

Moving from Prevention to Detection with the SOC Visibility Triad

February 24, 2020
Read blog post
Security operations

Vectra and Microsoft Join Forces to Fulfill the SOC Triad

June 9, 2020
Read blog post
Security operations

Why NDR is a Required Component of NIST Zero Trust Architecture

October 22, 2020
Read blog post
Threat detection

なぜIDPSは最新の攻撃を検知する能力に欠けているのか

August 18, 2020
Read blog post
Security operations

セキュリティ担当者がIDPSで苦労する理由

August 25, 2020
Read blog post
Threat detection

アラート疲れと質の低いシグネチャーによって攻撃を見逃すことも

August 11, 2020
Read blog post
Threat detection

信ぜよ、されど確認せよ (Доверяй, но проверяй)

September 16, 2019
Read blog post
Breach

なぜ特権アクセスが不正に使用されていないかを監視することが重要なのか?

July 19, 2020
Read blog post
Breach

多要素認証(MFA)だけでは不十分、Office 365の悪質なOAuth アプリは普及し続ける

June 24, 2020
Read blog post
Infrastructure

New NIST guidelines on Zero Trust Architecture calls for deeper visibility into the network

October 7, 2019
Read blog post
Infrastructure

より詳細なネットワークの可視化を求めるゼロトラストアーキテクチャーについて、NISTが新たなガイドラインを発表

October 7, 2019
Read blog post
Cybersecurity

2019 Black Hat survey: The network is transforming

August 19, 2019
Read blog post
Security operations

Dridex resurfaces to open the door to credential theft

December 17, 2019
Read blog post
Threat detection

Trust, but verify (Доверяй, но проверяй)

September 16, 2019
Read blog post

Marcus Hartwig

Director, Product Marketing

Marcus Hartwig is a director of product marketing manager at Vectra. Has been active in the areas of IAM, PKI and enterprise security for more than two decades. His past experience includes product marketing at Okta, co-funding a company in cybersecurity professional services, as well as managing a security product company – a combination that has left him passionate about all parts of product marketing, design and delivery.

Posts from

Marcus Hartwig

July 21, 2021
|
By
Marcus Hartwig
Microsoft Partners with Vectra to Deliver Zero Trust Security 

Microsoft partners with Vectra to deliver Zero Trust security framework to provide analytics and mitigate threats emerging from distributed and hybrid-remote workforces.

Read More
January 14, 2021
|
By
Marcus Hartwig
Why the NIST Zero Trust Architecture No Longer Requires Decryption

Learn why a successful implementation of a Zero Trust Architecture requires a modern network detection and response solution that can collect metadata about encrypted traffic—without relying on the overhead of agents.

Read More
January 5, 2021
|
By
Marcus Hartwig
5 Steps of an Actual Maze Ransomware Post Incident

Discover step-by-step how Vectra identified early indicators of a ransomware attack and prevented the encryption of network file share in this blog.

Read More
October 22, 2020
|
By
Marcus Hartwig
Why NDR is a Required Component of NIST Zero Trust Architecture

National Institute for Standards and Technology (NIST) publication for the Zero Trust Architecture (NIST SP 800-207) relies heavily on continuous and accurate monitoring. Find out why network detection and response (NDR) is a required component.

Read More
October 15, 2020
|
By
Marcus Hartwig
Vectra and CrowdStrike Turn the Tables on Cyberattackers

Learn more about how Vectra’s new Detect Lockdown feature, made possible by integrating with CrowdStrike Falcon Insight Endpoint Detection and Response (EDR), enables you to automatically thwart cyberattackers on the device level.

Read More
September 8, 2020
|
By
Marcus Hartwig
Insiders and Whistleblowers

The ultimate goal of most insider attacks is to steal data. Just one insider threat incident can cost your organization up to $3 million. Learn when disclosure is protected and how to stay ahead of malicious attacks in this blog.

Read More
August 25, 2020
|
By
Marcus Hartwig
Why IDPS is Cumbersome and Hampers Security Personnel

Discover in this blog why many organizations are struggling with the burden of maintaining IDPS deployments and how security teams can instead concentrate on detecting and mitigating active threats inside the network with network detection and response.

Read More
August 18, 2020
|
By
Marcus Hartwig
Why IDPS Lacks the Capability to Detect Modern Attacks

Learn how IDPS is ill-equipped to detect what is known as lateral movement, east-west traffic, or simply attackers moving around inside your deployments due to reliance on signatures and being deployed at the network perimeter.

Read More
August 18, 2020
|
By
Marcus Hartwig
なぜIDPSは最新の攻撃を検知する能力に欠けているのか

なぜIDPSがラテラルムーブの動きや東西のトラフィックなど、内部を動き回る攻撃者を検知する能力に欠けているかについて説明いたします。

Read More
August 11, 2020
|
By
Marcus Hartwig
Alert Fatigue and Bad Signatures Leads to Missed Attacks

Consider getting rid of IDPS and the noise it creates and check out detecting and stopping cyberattacks using NDR. Free-up your security analysts to focus on investigations and threat-hunting instead of tweaking signatures.

Read More
August 11, 2020
|
By
Marcus Hartwig
アラート疲れと質の低いシグネチャーによって攻撃を見逃すことも

IDPSから、NDRへ置き換えるタイミングがきているのではないでしょうか。セキュリティアナリストが、シグネチャーの微調整作業に時間を費やす代わりに本当に必要な調査や脅威のハンティングに時間を使えるようにします。

Read More
July 19, 2020
|
By
Marcus Hartwig
なぜ特権アクセスが不正に使用されていないかを監視することが重要なのか?

サイバー攻撃が侵入拡大を図る過程では、多くの重要情報を入手できる特権アクセスが大きな鍵となります。

Read More
July 19, 2020
|
By
Marcus Hartwig
Why Does Monitoring How Privileged Account Access is Used (and Abused) Matter?

Privileged access is a key part of lateral movement in cyberattacks because privileged accounts have the widest range of access to critical information, making them the most valuable assets for attackers. The recent Twitter Hack compromising several high-profile accounts becomes another stark example.

Read More
June 24, 2020
|
By
Marcus Hartwig
MFA is Not Enough - Malicious OAuth Apps in Office 365 are Here to Stay

MFA is a great step to take, but there are always ways around preventive controls. One of the well-known MFA bypass techniques is the installation of malicious Azure/O365 OAuth apps. Learn why you need to implement detection-based solutions.

Read More
June 24, 2020
|
By
Marcus Hartwig
多要素認証(MFA)だけでは不十分、Office 365の悪質なOAuth アプリは普及し続ける

多要素認証(MFA)はセキュリティ対策の一つですが、悪意のあるAzure/O365 OAuthアプリのインストールなどの迂回する方法があります。

Read More
June 9, 2020
|
By
Marcus Hartwig
Vectra and Microsoft Join Forces to Fulfill the SOC Visibility Triad

Vectra announces a partnership and deep product integration with Microsoft Defender for Endpoint (EDR) and Microsoft Azure Sentinel (SIEM) to further our extensive partner ecosystem and allow our customers to leverage the tools they already are using.

Read More
June 9, 2020
|
By
Marcus Hartwig
MicrosoftとVectra AI社、SOCトライアド実現のために協業

Vectra AI社は、パートナーシップを結び、Microsoft Defender ATP (EDR) および Microsoft Azure Sentinel (SIEM) と深いレベルでの製品連携を行うことを発表しました。

Read More
February 24, 2020
|
By
Marcus Hartwig
Moving from Prevention to Detection with the SOC Visibility Triad

Modern SOCs today are looking for tools that can give them complete visibility into user endpoints, multi-cloud, hybrid, and on-prem networks, as well as correlation and forensic capabilities. In this search, the SOC visibility triad has emerged as the de-facto standard.

Read More
December 17, 2019
|
By
Marcus Hartwig
Dridex Resurfaces to Open the Door to Credential Theft

PAA enables SOC teams to monitor and defend against these types of attacks. In addition to our extensive models that detect command-and-control channels, this make the Cognito platform a powerful tool to combat evolving malware attacks against enterprises.

Read More
October 7, 2019
|
By
Marcus Hartwig
より詳細なネットワークの可視化を求めるゼロトラストアーキテクチャーについて、NISTが新たなガイドラインを発表

NISTは、その目的について「どんな企業もサイバーセキュリティリスクを完全に排除することはできません。ZTAを既存のサイバーセキュリティポリシーやガイダンス、ID管理やアクセス管理、継続的な監視、さらに全般的なサイバー・ハイジーンによって補完することで、全般的なリスクを軽減し、一般的な脅威から自社を保護できるようになります」としています。

Read More
October 7, 2019
|
By
Marcus Hartwig
New NIST Guidelines on Zero Trust Architecture Calls for Deeper Visibility Into the Network

According to NIST, “No enterprise can completely eliminate cybersecurity risk. When complemented with existing cybersecurity policies and guidance, identity and access management, continuous monitoring, and general cyber hygiene, ZTA can reduce overall risk exposure and protect against common threats.”

Read More
September 16, 2019
|
By
Marcus Hartwig
Trust, but Verify (доверяй, но проверяй)

In infosec, the concept of “zero trust” has grown significantly in the last couple of years and has become a hot topic. A zero-trust architecture fundamentally distrusts all entities in a network and does not allow any access to resources until an entity has been authenticated and authorized to use that specific resource, i.e. trusted.

Read More
September 16, 2019
|
By
Marcus Hartwig
信ぜよ、されど確認せよ (Доверяй, но проверяй)

情報セキュリティの世界で使われる「ゼロトラスト」というコンセプトは、ここ数年で大きく業界内で広がり、ホットなトピックになっています。基本的にゼロトラストアーキテクチャーは、ネットワークの全エンティティを信頼せず、エンティティが特定のリソースに対するアクセスについて認証または許可を受けていない(つまり信頼されない)限り、いかなるリソースへのアクセスも許可しないというものです。

Read More
August 19, 2019
|
By
Marcus Hartwig
2019 Black Hat Survey: The Network Is Transforming

For the second year in a row, we conducted the Vectra superhero survey at Black Hat. The survey is a quick six-question poll that helps us understand the current cloud adoption and top-of-mind concerns of attendees.

Read More