Media coverage

Vectra report reveals what attackers do once they bypass perimeter defenses

Sorry, this post has not been published yet, check again later!

November 5, 2014
Published by:

InfoTech

This is the first report, using real-world data from the Vectra X-series platforms currently in production networks, that reveals what attackers do within a network once they evade perimeter defenses.

Read publication

Most recent media coverage

US Issues Warning Over Recent Cyberattacks Targeting Cloud Services

January 14, 2021

Silicon Angle

Read more

Google: Attacker ‘Likely’ Had Access to Android Zero-Day Vulnerabilities

January 14, 2021

SC Magazine

Read more

CISA: Hackers Bypassed MFA to Access Cloud Service Accounts

January 14, 2021

Security Magazine

Read more