Vectra AI's Detections

Protecting your network from malicious behaviors.

Knowing the adversary is a traditional approach to defense. However, focusing on the myriad adversaries can be challenging. At Vectra AI, we build powerful AI-driven detections designed to find any threat based on their behaviors.

How Vectra AI Detects Threats

The modern cyber threat landscape is vast and varied, with over 250 known adversaries employing a myriad of tactics, techniques, and procedures (TTPs) to infiltrate and exploit networks. Despite this diversity, these adversaries often exhibit similar behaviors.

At Vectra AI, we understand these behaviors and have built advanced AI-driven detections to protect you against both known and unknown threats.

Our detection mechanisms are powered by advanced AI algorithms and machine learning techniques. By continuously analyzing network traffic and user behavior, Vectra AI identifies anomalies that could indicate malicious activity. Our platform is designed to detect a wide range of behaviors, including:

  • Command & Control: Identifying external entities controlling internal hosts.
  • Lateral Movement: Detecting attempts to move laterally within the network.
  • Reconnaissance: Uncovering efforts to map out network infrastructure.
  • Data Exfiltration: Recognizing unauthorized data transfers out of the network.
  • Privilege Escalation: Detecting unusual privilege-related activities.

Detection Categories

Detections of Reconnaissance Activities

Detections of Lateral Movement

Detections of C2 Activities

Detections of Exfiltration Activities

Detections of Botnet Activities

Detections by Attack Surface

Detections in the Network

Detections in Azure AD & M365

Detections in AWS