White papers

Threat Hunting and Detection: A SANS Review of Vectra Cognito

This paper explains why its difficult to detect attack behavior and outline Cognitos key features, touching on such topics as Cognitos interface and how it helps analysts move faster and more effectively; how the platform finds useful data for threat hunting; and the role of network traffic analysis and AI in monitoring and responding to threats. They will also discuss the detection of unusual hosts, advanced threat hunting and how Cognitos various features (reporting, metadata, shared links and more) help simplify tasks.

This resource is not yet available. It will be published soon so stay tuned!

Publication date:

January 16, 2020


In today’s security environment, attackers’ goals are focused on data access and exfiltration. Sophisticated attackers often use advanced malware-based espionage that can aggressively pursue and compromise specific targets. These attacks can include social engineering tactics, such as spear-phishing attempts, and deeply implanted malware that stealthily impersonates actual user behavior. Also, once a compromise has occurred, attackers attempt to maintain a persistent presence within the victim’s network, escalate privileges and move laterally within the victim’s network to extract sensitive information to locations under the attacker’s control.

Yes, yes, we know, filling out forms is painful. But staring at empty boxes is even more painful. Keep in mind the form may not load if you are using an ad blocker. Once the form is filled out, you will receive your resource via email.

Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.