Resources

Product and company overviews

Cognito Platform overview: The right data for detection and response

Product and company overviews

Cognito Stream: Network metadata with an opinion

Product and company overviews

Appliance and sensor specifications

Product and company overviews

Everything you need to know about Vectra as a company

Product and company overviews

Cognito Recall: AI-assisted threat hunting

Product and company overviews

Cognito Detect: AI-powered attacker detection

Product and company overviews

Solution overviews

How the Cognito platform protects the oil and gas sector from cyberthreats

Solution overviews

Recommendations when evaluating IDS for infrastructure-as-a-service deployments

Solution overviews

How the Cognito platform increases visibility and security of zero trust

Solution overviews

Protecting higher education networks from cyberthreats

Solution overviews

How medical device manufacturers can safeguard vital IP

Solution overviews

How pharmaceutical companies can protect valuable IP

Solution overviews

Protecting patient health and privacy from cybercriminals

Solution overviews

How financial institutions can stop cyberattacks in their tracks

Solution overviews

How manufacturing organizations can reduce business risk from cyberattackers

Solution overviews

Industry research

Infographic: An inside look at RDP cyberattacker behaviors

Industry research

Security pros need more and better visibility into their cloud networks

Industry research

2019 Black Hat Edition of the Attacker Behavior Industry Report

Industry research

2019 Gartner Market Guide for Network Traffic Analysis

Industry research

2019 RSA Conference Edition of the Attacker Behavior Industry Report

Industry research

EMA Research: 2019 Top 3 security analytics vendors decision guide

Industry research

451 Research: Network traffic analytics can augment security operations expertise

Industry research

2018 RSA Conference Edition of the Attacker Behavior Industry Report

Industry research

Computing Security magazine review: Cognito 'worth its weight in gold'

Industry research

CSO magazine: Using AI to outsmart threats with Vectra Cognito

Industry research

Frost & Sullivan Visionary Innovation Leadership Report 2018

Industry research

Compliance

Payment Card Industry Data Security Standard (PCI DSS)

Compliance Briefs

National Institute of Standards and Technology (NIST)

Compliance Briefs

Federal Financial Institutions Examination Council

Compliance Briefs

Defense Federal Acquisition Regulation Supplement

Compliance Briefs

New York State Department of Financial Services (NYSDFS)

Compliance Briefs

Product integration

Faster, context-driven investigations into cyberattacks with Vectra and Chronicle

Product integration

Automate response and speed remediation with Swimlane and Vectra

Product integration

Gain continuous threat visibility and enforcement with Check Point and Vectra

Product integration

Gain real-time visibility and automated response with Vectra and Forescout

Product integration

Detect threats faster in IT and OT networks with Vectra and Nozomi

Product integration

Videos

Tracking the progression of an attack through Cognito Detect

Videos

What would you say to a peer who asked you about Vectra Cognito?

Videos

Privilege-aware network detection and response strengthens zero-trust enforcement

Videos

AI in security operations centers: What we’ve learned so far

Videos

Conclusive threat hunting and incident investigations with Cognito Recall

Videos

Automatically surface hidden attacks in real time with Cognito Detect

Videos

The advent of Network Detection and Response in security operations

Videos

The Texas A&M University System cuts threat investigations from days to minutes

Videos

Hear from the former deputy secretary of the U.S Dept. of Homeland Security

Videos

Defeating and abusing machine learning-based detection technologies

Videos

Machine learning fundamentals for cybersecurity professionals

Videos

Vectra exec discusses cryptocurrency mining on the CNBC Nightly Business Report

Videos

On-demand webcasts

Using machine learning to unlock the potential of your security data

On-demand webcasts

AI in security operations: What we have learned so far

On-demand webcasts

Visibility of attacker behaviors in cloud environments

On-demand webcasts

Using observed privilege to strengthen zero-trust access

On-demand webcasts

Frost & Sullivan: Myths and truths when detecting threats in IoT environments

On-demand webcasts

Is your blue team fast enough to win the race against attackers?

On-demand webcasts

Case studies

ED&F MAN - Commodities trader finds sweet spot with AI-powered threat detection

Case studies

Video - Shop Direct embarks on a journey to cognitive security

Case studies

Video - Texas A&M cuts threat investigations from days to minutes

Case studies

Video - Cooper University Health Care talks about Vectra Cognito

Case studies

Anthony Collins Solicitors: Protecting client confidentiality with NDR

Case studies

The Ardagh Group: Faster detection and response to hidden cyberthreats

Case studies

AI-Driven Cybersecurity for Online Gaming Sites

Case studies

Shop Direct: Large online retailer minimizes business risk

Case studies

Mediclinic International: Using artificial intelligence to reduce cyber risk

Case studies

Bolton NHS Foundation Trust: Staying focused on quality patient care

Case studies

The University of Oklahoma: Tackling cyberthreats on campus

Case studies

The Texas A&M University System: An academic and research powerhouse

Case studies

Vetropack Group: European glassmaker sees threats clearly

Case studies

Tri-State Generation and Transmission: The power of protection

Case studies

Hydro Ottawa: Electricity distribution to homes and businesses

Case studies