Vectra Networks Honored as Cutting Edge and Editor’s Choice winner in Annual Cyber Defense Magazine Infosecurity Awards
Vectra Networks, the leader in automated threat management, today announced that Cyber Defense Magazine, the industry's leading electronic information security magazine and media partner of the RSA® Conference 2016, has named Vectra Networks, winner of the “Cutting Edge” and “Editor’s Choice” awards in the Network Security Solution and Intrusion Detection Systems categories.
“We’re thrilled to recognize next-generation innovation in the information security marketplace and that’s why Vectra has earned this award from Cyber Defense Magazine,” said Pierluigi Paganini, editor-in-chief, Cyber Defense Magazine. “Some of the best infosecurity defenses come from forward-thinking players who think outside of the box.”
Vectra uses a patent-pending combination of data science, machine learning, and behavioral analysis to detect malicious behavior in the network. All detections are correlated and prioritized to show an attack in context, and Vectra Networks’ machine learning adapts as attacks evolve.
“These awards recognize the advantage we deliver organizations with real-time detection of in-progress cyber attacks,” said Mike Banic, vice president of marketing at Vectra Networks. “Customers are the most vulnerable during the active phases of an attack and this is where Vectra plays a pivotal role. We address the gap between perimeter and forensic security technologies, and can stop attackers from spying, spreading and stealing within our customer networks.”
Award winners will be recognized this week at the RSA Conference in San Francisco.
Vectra® Networks is the leader in automated threat management solutions for real-time detection of in-progress cyber attacks. The company’s solution automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection. The American Business Awards also selected Vectra as the Gold Award winner for Tech Startup of 2015. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company’s headquarters are in San Jose, Calif., and it has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.
Cyber Defense Magazine is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free and limited print editions exclusively for the RSA Conferences and our paid subscribers. Learn more about us at http://www.cyberdefensemagazine.com.
For Vectra Networks:
Contact: Kylie Heintz, Director of Corporate Communications
Tel: 408-326-2020 ext. 136
For Cyber Defense Magazine:
Contact: Jessica Quinn, Director of Marketing & Public Relations
Tel: 1-800-518-5248 x2002
Vectra and the Vectra Networks logo are registered trademarks and Security that thinks, the Vectra Threat Labs, and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.
Vectra introduces the industry’s first privilege-aware network detection and response solution to strengthen the enforcement of zero trust
Cybersecurity leader Vectra establishes operations in Asia-Pacific to address growing demand for network detection and response in the cloud
Vectra research reveals that the most significant ransomware threat is the malicious encryption of shared network files in cloud service providers