Vectra named a 2018 TAG Cyber Distinguished Vendor
Vectra, the leader in automating the hunt for in-progress cyberattacks, announced it has been named a Distinguished Vendor in the 2018 TAG Cyber Security Annual. With this designation, Vectra joins an esteemed list of industry professionals and experts.
Each year, TAG Cyber publishes its three-volume report to the technology community for download at no cost. This year’s 2018 TAG Cyber Security Annual was developed to assist enterprise security teams as they modernize their cyber risk programs via the following three steps: Exploding the flat perimeter enterprise into distributed workloads; Offloading the resultant applications and networks onto cloud-based, software-defined infrastructure; and then Reloading protections using the best available cyber security technologies.
“What TAG Cyber is doing today is critical for our industry,” said Mike Banic, vice president of marketing at Vectra. “Its work in democratizing expert cyber security analysis is extremely valuable for enterprises of all sizes. This is especially true for helping security operations leaders understand the applications of artificial intelligence in cybersecurity and how it can augment their headcount by automating traditional manual threat hunting, triage and correlation.”
Each member of the list was hand-selected by Dr. Edward Amoroso, CEO of TAG Cyber. The report is available today for download at https://www.tag-cyber.com/annual/2018-annual. Volume Two of the report also includes an informative interview with Hitesh Sheth, chief executive officer at Vectra.
“The team at Vectra is bringing something interesting to the table,” said Amoroso. “By utilizing machine-learning algorithms, they are able to provide continuous automated cyber intrusion detection and reporting solutions.”
Vectra Cognito Cybersecurity AI Platform enables enterprises to detect and respond to cyber attacks in real time. Cognito performs non-stop, automated threat hunting, triage and correlation to prioritize the highest risks and integrates with endpoint, NAC, firewall and SIEM solutions to enhance context and enable quick response while the attack is happening. Multiple sensors provide input to enable Cognito to have full visibility into cyber attacker behaviors and cover diverse network environments including cloud providers, global data centers, remote office locations, and BYOD and IoT devices, ensuring attackers have nowhere to hide.
About Vectra Vectra® is transforming cybersecurity with AI. Its Cognito platform automates cyberattack detection and response from data center and cloud workloads to user and IoT devices. Cognito correlates threats, prioritizes hosts based on risk and provides rich context to empower response with existing security systems, reducing security operations workload by 168x. Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra has been issued 5 U.S. patents with 14 additional patents pending for cybersecurity applications of machine learning and artificial intelligence. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. For more information, visit https://vectra.ai
Vectra, the Vectra Networks logo and ‘Security that thinks’ are registered trademarks, and Cognito, the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
Media Contacts: LEWIS Global Communications, PR for Vectra email@example.com (781) 418-2400
Vectra Named to the 2019 CB Insights AI 100 List of Most Innovative Artificial Intelligence Startups
Vectra in die „2019 CB Insights AI 100“ - Liste der innovativsten Startups für künstliche Intelligenz aufgenommen
SecureLink partners with Vectra AI to power real-time detection of stealthy cyberattacks