Media coverage

What attackers do after bypassing perimeter defenses

Sorry, this post has not been published yet, check again later!

November 6, 2014
Published by:

Help Net Security

Vectra Networks collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass perimeter defenses, and what attackers do once inside networks.

Read publication

Most recent media coverage

Vectra expands into Asia-Pacific, appoints ex-Telstra exec as regional director

August 19, 2019

ARN

Read more

Cognito-owner Vectra comes to Australia

August 19, 2019

CRN Australia

Read more

Cybersecurity company Vectra sets up APAC HQ in Sydney

August 19, 2019

Which-50

Read more