Blog - article

Sorry, this blog post has not been posted yet. Come back and check again later!

Chronicle integration: Conduct faster, context-driven investigations into active cyberattacks with Vectra and Chronicle

By:
Jitin Dhanani
November 19, 2019

Cyberattackers with sophisticated hacking tools or the right stolen password can easily circumvent network perimeter security to spy, spread and steal assets inside networks.

This gap leaves security teams saddled with manual, time-consuming threat investigations and costly forensic analysis, often after damage is done.

The Cognito threat detection and response platform from Vectra now seamlessly integrates AI-based threat hunting and incident response of Chronicle Backstory, a global security telemetry platform, for increased context during investigations and hunts and greater operational intelligence.

The integration pulls the Cognito metadata-enriched detections directly into the Chronicle Backstory dashboard. Now, organizations can incorporate high-value detections from Cognito into their existing workflows and automate correlation in the Backstory security telemetry, providing greater context to threats and attacks.

The new integration with Cognito and Chronicle Backstory easily connects and correlates Vectra’s findings with other third-party solutions, pulling in additional context for the security team. Chronicle also captures, indexes and correlates Cognito threat detections in real time, making them available in a searchable repository so security teams can generate graphs, reports, alerts, dashboards and visualizations.

Learn more about the Vectra and Chronicle partnership in the solution brief.

About the author

Jitin Dhanani

Jitin Dhanani is the WW leader of Business Development at Vectra, where he oversees and manages Vectra’s ecosystem of technology alliance, managed security services (MSS), SI, OEM and cloud service provider partners. He is a business executive leader with 20 years of experience spanning Corporate Development, Strategy & Planning, and Management Consulting roles helping high tech companies drive sustainable growth and competitive market position by developing strong ecosystem partnerships and presence.

Author profile and blog posts

Most recent blog posts from the same author

Security operations

Check Point integration: Gain continuous threat visibility and enforcement

October 28, 2019
Read blog post
Security operations

Forescout integration: Gain real-time visibility and automated response

November 4, 2019
Read blog post
Security operations

Swimlane integration: Automate response and speed remediation with Swimlane and Vectra

November 11, 2019
Read blog post