Vectra Networks today announced that it will provide a live demonstration of its differentiated solution that delivers real-time detection of cyber attacks in-progress at the Gartner Security & Risk Management Summit next week. The Vectra solution uniquely extends automated real-time cybersecurity into all corners of an organization’s network – from the campus, to remote sites and internal network segments.
The demonstration will be held in Vectra Network’s Booth 255 at the Gartner Security & Risk Management Summit, June 8-11 at the Gaylord National Resort & Conference Center in National Harbor, Md.
Vectra is sponsoring a customer Solution Provider Session during which Under Armour will discuss the implementation of behavior-based advanced threat defense on June 10 at 9:30 am EDT in the conference center’s Maryland 1 ballroom.
In addition, Vectra Networks CTO Oliver Tavakoli will participate in the panel session “Discussion of Network Forensics Challenges and Provider Solutions.” The panel will be held on June 10 at 5 pm EDT in room Maryland B and will be moderated by Lawrence Pingree, Gartner Research Director.
“The Gartner Security & Risk Management Summit is the premier IT event to gain insights into emerging threats and security best practices,” said Mike Banic, vice president of marketing at Vectra Networks. “It’s the perfect venue to demonstrate how Vectra uses data science to proactively identify all phases of an active attack so loss can be prevented or mitigated.”
Vectra delivers a new class of advanced persistent threat (APT) defense delivering real-time detection and analysis of active network breaches. Its technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet-bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within a network. Vectra uses a patent-pending combination of data science and behavioral analysis to detect malicious behavior in the network. All detections are correlated and prioritized to show an attack in context, so security analysts can address the highest business risks quickly, rather than spending valuable time sifting through thousands of alerts.
The Gartner Security & Risk Management Summit provides attendees with best practices and strategies so they can maintain cost-effective security and risk programs to support digital business and drive enterprise success. The summit features five complete programs on IT Security, Risk Management and Compliance, Business Continuity Management, and CISO roles. Each program offers a full track of analyst sessions, keynotes, roundtable discussions, case studies, workshops, and more. Attendees can build a custom agenda across all five, or attend sessions in a single program. For more information, see http://www.gartner.com/technology/summits/na/security/.
Vectra Networks™ is the leader in real-time detection of in-progress cyber attacks. The company’s advanced threat-detection solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection. Vectra’s investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.
Vectra Networks and Threat Certainty Index are registered trademarks of Vectra Networks in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Understand more about the Vectra platform and its approach to threat detection and response.Request a demo