Media coverage

Will 2015 be the year of information security disruption?

Sorry, this post has not been published yet, check again later!

February 9, 2015
Published by:

CRN

With IDS/IPS and next-generation firewalls focusing on detecting the initial exploit, Vectra uncovers reconnaissance activity, lateral movement within the network and brute-force attacks into systems and processes that point to attackers acquiring data and uploading it to a remote server.

Read publication

Most recent media coverage

What’s cybercriminals’ most effective weapon in a ransomware attack?

September 19, 2019

(In)secure Magazine

Read more

Cyberwar is here: Are you ready?

September 19, 2019

PC Magazine

Read more

Capital One: What’s in your cloud?

September 19, 2019

Security Magazine

Read more