Vectra Networks Honored as Network Security Cutting Edge Award Winner in 3rd Annual 2015 Cyber Defense Magazine Awards Program
Vectra Networks, the leader in real-time detection of cyber attacks in-progress, today announced that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2015, has named the Vectra Networks X-series as the winner of the 2015 Cutting Edge Award in the Network Security Solutions award category. Award winners were determined after many months of review, and were judged by leading independent information security experts.
“We’re thrilled to recognize next-generation innovation in the information security marketplace and that’s why Vectra Networks has earned this award from Cyber Defense Magazine,” said Pierluigi Paganini, Editor-in-Chief, Cyber Defense Magazine. “Some of the best INFOSEC defenses come from these kinds of forward thinking players who think outside of the box.”
Vectra Networks delivers a new class of advanced persistent threat (APT) defense delivering real-time detection and analysis of active network breaches. Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet-bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within a network.
Vectra uses a patent-pending combination of data science, machine learning, and behavioral analysis to detect malicious behavior in the network. All detections are correlated and prioritized to show an attack in context, so security analysts can address the highest business risks quickly, rather than spending valuable time sifting through thousands of alerts.
“We are honored by this award that is another recent distinction validating our unique approach combining data science, machine learning and behavioral analysis to automatically detect threats and cyber attacks in real time,” said Mike Banic, Vectra Networks VP of Marketing. “We are pleased to receive Cyber Defense Magazine’s Network Security Cutting Edge Award, as Vectra is the only company to combine automated detection of cyber attacks with creating cutting-edge data visualizations that instantly display the proximity and potential impact of an attack to an organization’s key assets.”
Cyber Defense Magazine is the premier source of IT Security information. It is managed and published by and for ethical, honest, passionate information security professionals. Its mission is to share cutting edge knowledge; real world stories; and awards on the best ideas, products and services in the information technology industry. It delivers electronic magazines every month online for free and limited print editions exclusively for the RSA Conferences and our paid subscribers. Learn more at http://www.cyberdefensemagazine.com.
Vectra Networks is the leader in real-time detection of in-progress cyber-attacks. Vectra delivers continuous automated cyber-attack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.
Vectra Networks and Threat Certainty Index are registered trademarks of Vectra Networks in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Vectra research reveals 90% of surveyed organizations exhibit a form of malicious Remote Desktop Protocol (RDP) behaviors
Vectra expands operations in the Middle East to address the growing demand for network detection and response in the cloud
Vectra introduces the industry’s first privilege-aware network detection and response solution to strengthen the enforcement of zero trust