Marcus Hartwig

Director, Product Marketing

Marcus Hartwig was a director of product marketing manager at Vectra. Has been active in the areas of IAM, PKI and enterprise security for more than two decades. His past experience includes product marketing at Okta, co-funding a company in cybersecurity professional services, as well as managing a security product company – a combination that has left him passionate about all parts of product marketing, design and delivery.

Posts from

Marcus Hartwig

Insiders and Whistleblowers
September 8, 2020
|
By
Marcus Hartwig

Insiders and Whistleblowers

The ultimate goal of most insider attacks is to steal data. Just one insider threat incident can cost your organization up to $3 million. Learn when disclosure is protected and how to stay ahead of malicious attacks in this blog.

Read More
Why IDPS is Cumbersome and Hampers Security Personnel
August 25, 2020
|
By
Marcus Hartwig

Why IDPS is Cumbersome and Hampers Security Personnel

Discover in this blog why many organizations are struggling with the burden of maintaining IDPS deployments and how security teams can instead concentrate on detecting and mitigating active threats inside the network with network detection and response.

Read More
Why IDPS Lacks the Capability to Detect Modern Attacks
August 18, 2020
|
By
Marcus Hartwig

Why IDPS Lacks the Capability to Detect Modern Attacks

Learn how IDPS is ill-equipped to detect what is known as lateral movement, east-west traffic, or simply attackers moving around inside your deployments due to reliance on signatures and being deployed at the network perimeter.

Read More
Alert Fatigue and Bad Signatures Leads to Missed Attacks
August 11, 2020
|
By
Marcus Hartwig

Alert Fatigue and Bad Signatures Leads to Missed Attacks

Consider getting rid of IDPS and the noise it creates and check out detecting and stopping cyberattacks using NDR. Free-up your security analysts to focus on investigations and threat-hunting instead of tweaking signatures.

Read More
Why Does Monitoring How Privileged Account Access is Used (and Abused) Matter?
July 19, 2020
|
By
Marcus Hartwig

Why Does Monitoring How Privileged Account Access is Used (and Abused) Matter?

Privileged access is a key part of lateral movement in cyberattacks because privileged accounts have the widest range of access to critical information, making them the most valuable assets for attackers. The recent Twitter Hack compromising several high-profile accounts becomes another stark example.

Read More
MFA is Not Enough - Malicious OAuth Apps in Office 365 are Here to Stay
June 24, 2020
|
By
Marcus Hartwig

MFA is Not Enough - Malicious OAuth Apps in Office 365 are Here to Stay

MFA is a great step to take, but there are always ways around preventive controls. One of the well-known MFA bypass techniques is the installation of malicious Azure/O365 OAuth apps. Learn why you need to implement detection-based solutions.

Read More
Vectra and Microsoft Join Forces to Fulfill the SOC Visibility Triad
June 9, 2020
|
By
Marcus Hartwig

Vectra and Microsoft Join Forces to Fulfill the SOC Visibility Triad

Vectra announces a partnership and deep product integration with Microsoft Defender for Endpoint (EDR) and Microsoft Azure Sentinel (SIEM) to further our extensive partner ecosystem and allow our customers to leverage the tools they already are using.

Read More
Moving From Prevention to Detection With the Soc Visibility Triad
February 24, 2020
|
By
Marcus Hartwig

Moving from Prevention to Detection with the SOC Visibility Triad

Modern SOCs today are looking for tools that can give them complete visibility into user endpoints, multi-cloud, hybrid, and on-prem networks, as well as correlation and forensic capabilities. In this search, the SOC visibility triad has emerged as the de-facto standard.

Read More
Dridex Resurfaces to Open the Door to Credential Theft
December 17, 2019
|
By
Marcus Hartwig

Dridex Resurfaces to Open the Door to Credential Theft

PAA enables SOC teams to monitor and defend against these types of attacks. In addition to our extensive models that detect command-and-control channels, this make the Cognito platform a powerful tool to combat evolving malware attacks against enterprises.

Read More
Trust, but Verify  (доверяй, но проверяй)
September 16, 2019
|
By
Marcus Hartwig

Trust, but Verify (доверяй, но проверяй)

In infosec, the concept of “zero trust” has grown significantly in the last couple of years and has become a hot topic. A zero-trust architecture fundamentally distrusts all entities in a network and does not allow any access to resources until an entity has been authenticated and authorized to use that specific resource, i.e. trusted.

Read More
Privileged Access Analytics
September 9, 2019
|
By
Marcus Hartwig

Privileged Access Analytics

Since the early days of Vectra, we’ve been focused primarily on host devices. After all, hosts are the entities that generate the network traffic the Cognito platform analyses in looking for attacker behaviors.

Read More
2019 Black Hat Survey: The Network Is Transforming
August 19, 2019
|
By
Marcus Hartwig

2019 Black Hat Survey: The Network Is Transforming

For the second year in a row, we conducted the Vectra superhero survey at Black Hat. The survey is a quick six-question poll that helps us understand the current cloud adoption and top-of-mind concerns of attendees.

Read More