Product and company overviews

Cognito StreamPlus: On-premises Data Lake for Network Metadata

Vectra Technical Support

Vectra Sidekick Services

Vectra Advisory Services

Cognito Recall - Security and Privacy Statement

Cognito Metadata Attributes and Their Descriptions

Remote Work, Not Remote Control: Detection Guidance

Vectra Cognito Implementation Services

The Tradeoff Between Automatic and Manual Enforcement

Infographic: Intelligent Enforcement with Vectra

Cognito Detect for Office 365

Infographic: Securing Office 365

The Cognito NDR Platform

Cognito Stream: Network Metadata with an Opinion

Appliance and Sensor Specifications

Everything You Need to Know About Vectra

Cognito Recall: AI-assisted Threat Hunting

Cognito Detect: AI-powered Attacker Detection
Solution overviews

DreamPort Hack the Building Brief

How Vectra Secures Your Entire Network

Securing Critical National Infrastructure with Network Detection and Response
.png)
Network Threat Detection and Response for Amazon Web Services (AWS)

How the Cognito NDR Platform Secures and Accelerates Mergers and Acquisitions

How the Cognito NDR Platform Protects the Oil and Gas Sector from Cyberthreats

Recommendations When Evaluating NDR for IaaS

How the Cognito NDR Platform Increases Visibility and Security of Zero Trust

SOC Visibility Triad - The Ultimate in SOC Visibility

Protecting Higher Education Networks from Cyberthreats

How Medical Device Manufacturers Can Safeguard Vital IP

How Pharmaceutical Companies Can Protect Valuable IP

Protecting Patient Health and Privacy from Cybercriminals

How Financial Institutions Can Stop Cyberattacks in Their Tracks

How Manufacturing Organizations Can Reduce Business Risk from Cyberattacks
Industry research

SANS: Hunting in Network Telemetry

Securing Microsoft Office 365 in the New Normal

EMA: Securing Cloud Assets - How Security Pros Grade Their Own Progress

Breaking Down the SolarWinds Breach: an Inside Look at the Methods Used

Rapid Response SunBurst Attack Infographic

IDC: Business Value of Vectra Cognito Platform

IDC: The Business Value of Cognito Network Detection and Response from Vectra

2020年 Office 365 スポットライトレポート

SANS: 20/20 Vision for Implementing a Security Operations Center

ESG Report: Moving Beyond IDS with Network Detection and Response (NDR)

Spotlight Report on Office 365

451 Research: 2020 Trends in Information Security

2020 Spotlight Report on Healthcare

2020 Gartner Market Guide for Network Detection and Response

2020 Spotlight Report on Privileged Access

2020 Vectra Attacker Behavior Industry Report

SANS: Threat Hunting with Consistency

2019 Spotlight Report on RDP

2019 Ransomware Infographic

Spotlight Report on Ransomware
Competitive

Stealthwatch and the Risk of Equating Networking with Security

Is Next-Generation IPS Masking an Old Problem?

The Dark Side of Darktrace
Compliance

Vectra Cognito Detect for Office 365 Security and Compliance Brief

Cybersecurity Maturity Model Certification

Payment Card Industry Data Security Standard (PCI DSS)

National Institute of Standards and Technology (NIST)

How Cognito Supports the MITRE Enterprise ATT&CK Framework

General Data Protection Regulation (GDPR)

Federal Financial Institutions Examination Council

Defense Federal Acquisition Regulation Supplement

CIS Critical Security Controls

CDM Phase 3 DEFEND:

New York State Department of Financial Services (NYSDFS)
White papers

Incident Response Maturity: Time to Grow Up

Identifying Security Risks in Remote Worker Traffic using Vectra NDR

Threat Detection and Response in Cloud Environments

Threat Hunting and Discovery: A SANS Review of Vectra Cognito

How to Detect Malicious Covert Communications

The Data Science Behind Vectra AI Threat Detection Models

How the Cognito NDR Platform is Ideal for Replacing IDS

How to Augment Security Operations Centers with AI

How to Improve ROI and Operational Efficiency for Cybersecurity

How Cognito Secures Cloud Data Centers from Cyberattacks
Product integration

Vectra Integrates with Zscaler to Provide Zero Trust End-to-End Access Protection

Sentinel One + Vectra: Detect and Mitigate Cyberattacks with Behavior-based AI

Microsoft and Vectra Complete the Vision of the SOC Visibility Triad

Cybereason + Vectra: Full Visibility, Faster Response

Network Detection and Response for Amazon Web Services (AWS)

Fortinet and Vectra: Advanced Monitoring and NDR with Automated Response

cPacket Networks and Vectra Deliver NDR with Fast Forensics

Integrating Cognito with Palo Alto Networks

Faster, Context-driven Investigations into Cyberattacks with Chronicle and Vectra

Automate Response and Speed Remediation with Swimlane and Vectra

Gain Continuous Threat Visibility and Enforcement with Check Point and Vectra

Gain Real Time Visibility and Automated Response with Forescout and Vectra

Detect Threats Faster in IT and OT Networks with Nozomi and Vectra

Integrating Cognito with Ixia

Integrating Cognito with Gigamon

Integrating Cognito with Juniper Firewalls

Integrating Cognito with Splunk Phantom

Integrating Cognito with Demisto

Integrating Cognito with Splunk

Integrating Cognito with IBM QRadar

Integrating Cognito with Micro Focus ArcSight

Integrating Cognito with Carbon Black

Integrating Cognito with CrowdStrike

Integrating Cognito with VMware
Videos

The Very Group Reduces Number of Alerts by 92% with Vectra

Find Compromised User Accounts and Hosts with Vectra Recall

Cognito Detect for Office 365

Complete the SOC Visibility Triad with Network Detection and Response

What Federal Agencies Can Do to Secure Cloud Deployments with AI and ML

How Federal Agencies Use Zero Trust, AI, and ML to Combat Modern Attacks

Visibility and Response for Public, Private, and Hybrid Cloud Environments

Vectra Combats the Supply Chain Attack, SolarFlare

Detect Ransomware Before it Encrypts Anything

Cognito Detect Overview Video (2 min)

The SolarWinds Orion Breach, SunBurst, and What You Can Do about It

HomeServe Talks About Vectra Cognito

EDRが抱える課題を解決する最新のAI技術 〜NDRとは?

Deploying the Vectra Platform in AWS

Is the cloud safe?

Tracking the Progression of an Attack through Cognito Detect

Can you imagine your workday without Cognito?

What would you say to a peer who asked you about Vectra Cognito?

Identifying Privilege in the Cognito platform

Cognito Stream Overview Video

Under Armour talks about Vectra Cognito

Kronos Incorporated Talks about Vectra Cognito

AI in Security Operations Centers: What We’ve Learned So Far

InfoSecurity Europe 2019 Highlights

Securing AWS Deployments with Vectra Cognito

Security Weekly #591 with Chris Morales

Demo: Cognito Stream - Network Metadata with an Opinion

Conclusive Threat Hunting and Incident Investigations with Cognito Recall

Automatically Surface Hidden Attacks in Real Time with Cognito Recall

Vectra Partner, LC Systems, Talks about the Cognito platform

Vectra Partner, Threatscape, Talks about the Cognito Platform

Demo: Cognito Integration with CrowdStrike Falcon

Cooper University Health Care Talks about Vectra Cognito

HBO Latin America Talks about Vectra Cognito

The Cube Conversation with Hitesh Sheth: Why AI and Why Vectra

The Texas A&M University System Cuts Threat Investigations from Days to Minutes
.png)
Hear from the Former Deputy Secretary of the U.S Dept. of Homeland Security

Defeating and Abusing Machine Learning-based Detection Technologies

Machine Learning Fundamentals for Cybersecurity Professionals
E-books

What is Network Detection and Response (NDR)?

How Cyberattackers Evade Threat Signatures

A New Threat Detection Model That Closes the Cybersecurity Gap

Six Critical Attack Vectors to Detect in Your Data Center and Private Cloud
Case studies

INDEVCO relies on Vectra for complete visibility and proactive threat detection

Video - The Very Group Reduces Number of Alerts by 92% with Vectra

Manufacturing Company Responds in Real Time Across the Network with Vectra

Finance Company Protects Network During Work from Home with Vectra

Manufacturing Company is Able to Identify Normal Behavior in Network with Vectra

Retail Company Cuts Down Investigations by Days and Hours to Minutes with Vectra

Media Company Receives Top Detection Quality from Vectra

Vectra Reduces Analyst's Workload by 40% for Mining and Metals company

American University Reduces Time to Respond to Attacks by 20%

Vectra Streamlines Investigation Process to 24 Hours for Technology Company

Financial Company uses Detect for O365 to Protect Network

University Gains Network Transparency with Detect for O365

Retail Company uses Vectra to Detect Anomalies in Network

Mining Company Experiences Increased Security Efficiency with Vectra

Manufacturing Company Identifies True Cause of Events in Two Hours with Vectra

Financial Company Uses Vectra to Capture Network Data

Energy Company uses Detect and Recall to Find Malicious Behavior in Minutes

Insurance Company Gains Full Visibility into Attack Lifecycle with Vectra

mLeasing Uses the Cognito Platform to Detect and Respond to Modern Cyberattacks

Nissho Electronics Stops Data Breaches from Enterprise to Cloud

Greenhill Stops Cyberattacks from Enterprise to Office 365 SaaS with Vectra

Rossmann Receives Automated Scoring and Critical Alert Prioritization from Vectra

Fenaco, Mega-producer of Consumer Goods, Relies on Vectra in the SOC

University Healthcare System Uses Vectra to Expose the Truth about Cyberattacks

Beauty Industry Retailer Receives Cybersecurity Makeover After Deploying Vectra

GMMH NHS Foundation Trust Stops Attacks with Cognito Detect for Office 365

A Customer’s Perspective: Ransomware Post-Incident Report

Financial Company Uses Cognito Detect for Office 365 to Stop Attacks

Pennine Care NHS Foundation Trust Hunts Internal Attackers with Vectra

Telecommunications Company Gains Full Visibility with Vectra and AWS Integration

American University Drops Open Source Tools for Network Detection and Response

Securities Exchange Operationalizes Infrastructure with Vectra

Major Real Estate Firm Replaces IDS/IPS with Vectra

International Private Healthcare Group Achieves Real-Time Threat Detection

ED&F MAN - Commodities Trader Finds Sweet Spot with AI-powered Threat Detection

HomeServe Talks about Vectra Cognito

Video - Kronos Talks about Vectra Cognito

Video - HBO Latin America Talks about Vectra Cognito

Video - Texas A&M Cuts Threat Investigations from Days to Minutes

Video - Cooper University Health Care Talks about Vectra Cognito

Video - Under Armour Talks about Vectra Cognito

The Ardagh Group: Faster Detection and Response to Hidden Cyberthreats

DZ BANK: Achieving Security and Privacy

AI-Driven Cybersecurity for Online Gaming Sites

Specialty Chemicals and Advanced Materials

The Very Group: Large Online Retailer Minimizes Business Risk

Bolton NHS Foundation Trust: Staying Focused on Quality Patient Care

The Texas A&M University System: An Academic and Research Powerhouse

Tri-State Generation and Transmission: The Power of Protection

Hydro Ottawa: Electricity Distribution to Homes and Businesses