Blog - article

Vectra SaaS detections – Office 365

Vectra SaaS detections – Office 365

Vectra SaaS detections – Office 365

February 11, 2020

With increasingly sophisticated threats, cyber risk is becoming an escalating concern for organizations around the world. Data breaches through Office 365 lead the pack as 40% of organizations suffer from account takeovers despite the rising adoption of incremental security approaches like multi-factor authentication.

Office 365 has more than 180 million monthly users, according to Microsoft’s Q3 FY19 earnings call, making it impossible to have 100% cyber hygiene. It is only a matter of time before an attacker moves laterally into other parts of the infrastructure once an initial foothold is obtained.

That’s why we are excited to announce Vectra’s Cognito Detect for Office 365 solution to extend the efficiency of your security operations and help securely and successfully protect applications.

Backed by new detection models covering everything from credentials and privilege to configuration for SaaS applications, Vectra expands cloud coverage from Infrastructure-as-a-Service (IaaS) and extends the ability to track attacker activity pivoting between on-premise, data center, IaaS and SaaS.

“The last thing we want is to create more work for security teams. What is needed is technology that removes the dependency on human behavior and human error and brings control back to the security team. This is what Vectra can provide,” says Vectra CEO Hitesh Sheth.  

Take back control and get complete visibility across your deployment footprint and leave attackers without a place to hide. Learn more about Vectra’s Cognito Detect for Office 365.

About the author


Vectra® is the world leader in AI-powered network detection and response.

Author profile and blog posts

Most recent blog posts from the same author


Breaking ground: Understanding and identifying hidden tunnels

July 11, 2018
Read blog post

Giving incident responders deeper context about what happened

June 4, 2018
Read blog post
Threat detection

Attackers can use your admin tools to spy, spread, and steal

January 26, 2018
Read blog post