CIS Critical Security Controls

CIS Critical Security Controls

  • Passively monitor and analyze all network traffic to identify authorized and unauthorized devices.
  • Real-time detection of suspicious use of admin credentials and data from key in-scope assets.
  • Early detection of ransomware, other malware variants and hidden attacker behaviors.
  • Detect cyberattackers in hidden DNS, HTTP and HTTPS tunnels and encrypted traffic.
Get the CIS Critical Security Controls compliance brief

Other standards Vectra Cognito helps with

National Institute of Standards and Technology (NIST)

  • Network metadata is analyzed by behavioral algorithms to detect threats in real time.
  • Nonstop attacker detection in all cloud/data center workloads and user/IoT devices.
  • Detect and prioritize cyberattacks and trigger real-time notifications to security teams.
  • Consistent reporting of threat detections, causes, business impacts, and steps to verify.
Get the NIST compliance brief

General Data Protection Regulation (GDPR)

  • Augment data handling standards by detecting unauthorized access of personal information.
  • Early detection of hidden cyberattacker behaviors that evade security defenses.
  • Meet the 72-hour notification timeframe using rich context about cyberattacks and a forensic trail of evidence.
  • Monitor nonstop all cloud/data center workloads and user/IoT devices for impact assessment.
Get the GDPR compliance brief

Federal Financial Institutions Examination Council (FFIEC)

  • Prioritize and correlate the highest-risk threats with compromised in-scope assets.
  • Early detection of ransomware, other malware variants and hidden attacker behaviors.
  • Real-time detection of suspicious use of admin credentials and data from key in-scope assets.
  • Nonstop detection of attack behaviors in all cloud/data center workloads and user/IoT devices.
Get the FFIEC compliance brief