Search

Not sure what to search for? Checkout our resources below

Product and company overviews

Vectra Cognito Implementation Services

Product and company overviews

The Tradeoff Between Automatic and Manual Enforcement

Product and company overviews

Infographic: Intelligent Enforcement with Vectra

Product and company overviews

Cognito Stream: Network Metadata with an Opinion

Product and company overviews

Appliance and Sensor Specifications

Product and company overviews

Everything You Need to Know About Vectra

Product and company overviews

Cognito Recall: AI-assisted Threat Hunting

Product and company overviews

Cognito Detect: AI-powered Attacker Detection

Product and company overviews

Solution overviews

Network Threat Detection and Response for Amazon Web Services (AWS)

Solution overviews

How the Cognito NDR Platform Secures and Accelerates Mergers and Acquisitions

Solution overviews

How the Cognito NDR Platform Protects the Oil and Gas Sector from Cyberthreats

Solution overviews

How the Cognito NDR Platform Increases Visibility and Security of Zero Trust

Solution overviews

SOC Visibility Triad - The Ultimate in SOC Visibility

Solution overviews

Protecting Higher Education Networks from Cyberthreats

Solution overviews

How Medical Device Manufacturers Can Safeguard Vital IP

Solution overviews

How Pharmaceutical Companies Can Protect Valuable IP

Solution overviews

Protecting Patient Health and Privacy from Cybercriminals

Solution overviews

How Financial Institutions Can Stop Cyberattacks in Their Tracks

Solution overviews

How Manufacturing Organizations Can Reduce Business Risk from Cyberattacks

Solution overviews

Industry research

451 Research: 2020 Trends in Information Security

Industry research

2020 Gartner Market Guide for Network Detection and Response

Industry research

Infographic: An Inside Look at RDP Cyberattacker Behaviors

Industry research

EMA Research: 2019 Top 3 Security Analytics Vendors Decision Guide

Industry research

451 Research: Network Traffic Analytics Can Augment Security Operations Expertise

Industry research

Computing Security Magazine Review: Cognito 'Worth its Weight in Gold'

Industry research

CSO magazine: Using AI to Outsmart Threats with Vectra Cognito

Industry research

Frost & Sullivan Visionary Innovation Leadership Report 2018

Industry research

Compliance

Payment Card Industry Data Security Standard (PCI DSS)

Compliance Briefs

National Institute of Standards and Technology (NIST)

Compliance Briefs

How Cognito Supports the MITRE Enterprise ATT&CK Framework

Compliance Briefs

Federal Financial Institutions Examination Council

Compliance Briefs

Defense Federal Acquisition Regulation Supplement

Compliance Briefs

New York State Department of Financial Services (NYSDFS)

Compliance Briefs

White papers

Identifying Security Risks in Remote Worker Traffic using Vectra NDR

White papers

Threat Hunting and Discovery: A SANS Review of Vectra Cognito

White papers

The Data Science Behind Vectra AI Threat Detection Models

White papers

How the Cognito NDR Platform is Ideal for Replacing IDS

White papers

How to Improve ROI and Operational Efficiency for Cybersecurity

White papers

How Cognito Secures Cloud Data Centers from Cyberattacks

White papers

Product integration

Sentinel One + Vectra: Detect and Mitigate Cyberattacks with Behavior-based AI

Product integration

Microsoft and Vectra Complete the Vision of the SOC Visibility Triad

Product integration

Cybereason + Vectra: Full Visibility, Faster Response

Product integration

Network Detection and Response for Amazon Web Services (AWS)

Product integration

Fortinet and Vectra: Advanced Monitoring and NDR with Automated Response

Product integration

cPacket Networks and Vectra Deliver NDR with Fast Forensics

Product integration

Faster, Context-driven Investigations into Cyberattacks with Chronicle and Vectra

Product integration

Automate Response and Speed Remediation with Swimlane and Vectra

Product integration

Gain Continuous Threat Visibility and Enforcement with Check Point and Vectra

Product integration

Gain Real Time Visibility and Automated Response with Forescout and Vectra

Product integration

Detect Threats Faster in IT and OT Networks with Nozomi and Vectra

Product integration

Videos

Tracking the progression of an attack through Cognito Detect

Videos

What would you say to a peer who asked you about Vectra Cognito?

Videos

Conclusive threat hunting and incident investigations with Cognito Recall

Videos

Automatically surface hidden attacks in real time with Cognito Detect

Videos

The advent of Network Detection and Response in security operations

Videos

The Texas A&M University System cuts threat investigations from days to minutes

Videos

Hear from the former deputy secretary of the U.S Dept. of Homeland Security

Videos

Defeating and abusing machine learning-based detection technologies

Videos

Machine learning fundamentals for cybersecurity professionals

Videos

On-demand webcasts

Förebygg, upptäck och hantera cyberattacker med hjälp av AI

On-demand webcasts

Detect and Respond to Threats Leveraging the SOC Visibility Triad with Microsoft

On-demand webcasts

How to Detect and Eliminate Cloud Attacks with Swimlane and Vectra

On-demand webcasts

How to Apply the SOC Visibility Triad Across Your Enterprise with Microsoft

On-demand webcasts

Vectra et Microsoft Finalisent le modèle de la triade SOC

On-demand webcasts

SOC Visibility Triad met Splunk, Cybereason en Vectra

On-demand webcasts

Vectra und Microsoft vervollständigen die SOC-Sichtbarkeits-Triade

On-demand webcasts

The Power of 3—Why You Should Care About the SOC Visibility Triad

On-demand webcasts

Threat Hunting in the Cloud: How to Leverage NDR to Find and Stop Attackers

On-demand webcasts

Better Together: Cybersecurity Solutions for the New Normal

On-demand webcasts

Why a Complete Picture Matters to Secure Your Cloud and On-Prem Workloads

On-demand webcasts

Lär dig hur du kan förbättra synligheten och tidig upptäckt genom att använda SOC

On-demand webcasts

Approfondisci la triade della visibilità SOC con Splunk, Cybereason e Vectra

On-demand webcasts

How DZ BANK added AI into their cybersecurity strategy

On-demand webcasts

Comment DZ BANK a intégré l'intelligence artificielle dans sa stratégie de cybers

On-demand webcasts

Der Einfluss von künstlicher Intelligenz auf DZ BANKs Cyber Security Strategie

On-demand webcasts

Network Detection and Response für Kritische Infrastrukturen – KRITIS, MELANI

On-demand webcasts

The Gift of Sight – Real Time Threat Detection

On-demand webcasts

Apprenez à améliorer la visibilité et la détection précoce en utilisant la triade

On-demand webcasts

Can I use machine learning to automate my network hunt?

On-demand webcasts

Enhance visibility and early detection by operationalizing the SOC triad

On-demand webcasts

How to secure your cloud infrastructure with Vectra

On-demand webcasts

How to use the SOC triad to elevate your security operations

On-demand webcasts

Prêt à reprendre le contrôle de la sécurité de Office 365

On-demand webcasts

Wollen Sie die Kontrolle über Ihre Office 365-Sicherheit zurückgewinnen

On-demand webcasts

Ready to take back control of office 365 security?

On-demand webcasts

Why a complete picture matters to secure your cloud and on-prem workloads

On-demand webcasts

How NHS Bolton empowers its security team with AI

On-demand webcasts

How do I identify privilege and credential abuse?

On-demand webcasts

Using Vectra Recall for AI-assisted threat hunting

On-demand webcasts

How do I use my network to strengthen zero trust?

On-demand webcasts

Controlling Cyber-risk in Mergers and Acquisitions

On-demand webcasts

Visibility of attacker behaviors in cloud environments

On-demand webcasts

Using observed privilege to strengthen zero-trust access

On-demand webcasts

Frost & Sullivan: Myths and truths when detecting threats in IoT environments

On-demand webcasts

Case studies

Pennine Care NHS Foundation Trust Hunts Internal Attackers with Vectra

Case studies

Telecommunications Company Gains Full Visibility with Vectra and AWS Integration

Case studies

American University Drops Open Source Tools for Network Detection and Response

Case studies

Securities Exchange Operationalizes Infrastructure with Vectra

Case studies

International Private Heathcare Group Achieves Real-Time Threat Detection

Case studies

ED&F MAN - Commodities Trader Finds Sweet Spot with AI-powered Threat Detection

Case studies

Video - The Very Group Embarks on a Journey to Cognitive Security

Case studies

Video - Texas A&M Cuts Threat Investigations from Days to Minutes

Case studies

Video - Cooper University Health Care Talks about Vectra Cognito

Case studies

The Ardagh Group: Faster Detection and Response to Hidden Cyberthreats

Case studies

AI-Driven Cybersecurity for Online Gaming Sites

Case studies

The Very Group: Large Online Retailer Minimizes Business Risk

Case studies

Bolton NHS Foundation Trust: Staying Focused on Quality Patient Care

Case studies

The Texas A&M University System: An Academic and Research Powerhouse

Case studies

Tri-State Generation and Transmission: The Power of Protection

Case studies

Hydro Ottawa: Electricity Distribution to Homes and Businesses

Case studies