Decisive containment during active attacks. Lockdown compromised identities, isolate devices, and block attacker traffic using high-fidelity detections.
Watch Identity Lockdown automatically shutting down compromised identities.
See Device Lockdown isolating compromised endpoints before they move.
View Traffic Lockdown cut off attacker communication at the firewall.
Most tools try to stop attackers by disrupting a single connection, with actions like TCP resets. It sounds effective. It isn't enough.
360 Response converts Vectra AI’s attack signal intelligence into precise, enforced actions wherever attackers operate in your hybrid environment:

Account containment across AD and Entra ID
Attackers lose their identity foothold in across on-prem and cloud environments.
Host and endpoint containment using your existing EDR
The endpoint the attacker depends on is removed from play.
Network containment enforced by your firewalls
Command-and-control, exfiltration, and internal pivoting are cut off at the network layer.
All three layers work together, driven by the same AI signal, from the same analyst experience.
With 360 Response, defenders move from hoping disruption is enough to knowing containment is enforced.
360 Response turns every high-fidelity detection into a decisive action that stops attackers and shows that your team is in command of the environment.
360 Response is Vectra AI’s unified containment capability that enables security teams to stop active attacks across identity, host, and network layers. It is a core component of the Vectra AI Platform’s continuous control approach, transforming high-confidence AI detections into enforced response actions. 360 Response uses existing identity providers, endpoint detection and response tools, and firewalls to contain threats without introducing new agents or manual workflows. By coordinating containment across multiple layers, 360 Response helps organizations regain control during active compromise and reduce the risk of escalation in complex hybrid environments.
360 Response supports continuous control by enabling fast, coordinated containment while a hybrid attack is in progress. It applies response actions across the most abused layers of the hybrid environment, including identity, endpoints, and network traffic. When high-confidence threats are detected, 360 Response can trigger identity, device, and traffic lockdowns either manually or automatically. This coordinated response cuts off attacker access, lateral movement, and communication paths at the same time, helping security teams act decisively and maintain control as attacks unfold rather than reacting after damage has occurred.
Identity Lockdown helps stop identity-based attacks by disabling or restricting compromised user accounts in Active Directory and Entra ID. When triggered, it can revoke active sessions and support password reset workflows to invalidate stolen credentials. This prevents attackers from reusing valid identities to access cloud services, SaaS applications, or on-premises resources. Identity abuse is one of the most common escalation techniques in modern attacks, and Identity Lockdown removes that advantage quickly. By enforcing identity containment early through identity threat detection and containment, security teams reduce the likelihood of privilege escalation and cross-environment pivoting.
Device Lockdown isolates compromised devices using native integrations with endpoint detection and response tools already deployed in the environment. When a device is locked down, it is removed from the network, preventing lateral movement and stopping attacker activity from that device. 360 Response does not require an additional endpoint agent, which helps teams avoid added complexity or deployment friction. Device Lockdown can be initiated manually by analysts or automatically for high-confidence threats, enabling fast containment while remaining consistent with existing security integrations with leading EDR platforms.
Traffic Lockdown enforces network-level containment by blocking attacker communication through firewall-based controls. When a threat enters lockdown, its IP address is added to a Vectra-managed blocklist that firewalls consume as an external threat feed. Firewall policies then deny traffic from those IPs, preventing command-and-control, data exfiltration, and internal pivoting. Unlike connection resets, this approach enforces persistent, policy-driven blocking that attackers cannot bypass. Traffic Lockdown extends the value of Network Detection and Response (NDR) capabilities by turning detection into enforced action.
360 Response is one of five foundational components of Vectra AI’s continuous control framework, alongside proactive threat exposure management, value reporting, analyst experience, and managed services. Together, these capabilities help organizations reduce exposure before compromise, contain threats during active attacks, and prove resilience after incidents are resolved. 360 Response focuses on the response phase by delivering enforced containment across identity, host, and network layers. When combined with Vectra AI’s detection, investigation, and reporting capabilities, it enables security teams to demonstrate measurable improvements in control, resilience, and operational maturity.
360 Response delivers true control across identity, host, and network so attackers lose every path they rely on. Paired with the Vectra AI Platform’s extensive attack surface coverage, high-fidelity signal and unified investigation experience, your team gets control to enforce containment across your entire hybrid environment.