Resources

Product and company overviews

Product and company overviews

Cognito Platform overview: The right data for detection and response

Product and company overviews

Cognito Stream: Network metadata with an opinion

Product and company overviews

Cognito Recall: AI-assisted threat hunting

Product and company overviews

Cognito Detect: AI-powered attacker detection

Product and company overviews

Appliance and sensor specifications

Product and company overviews

Everything you need to know about Vectra as a company

Industry research

Industry research

Frost & Sullivan Visionary Innovation Leadership Report 2018

Industry research

EMA Radar Summary for Network-Based Security Analytics

Industry research

CSO magazine: Using AI to outsmart threats with Vectra Cognito

Industry research

2018 Spotlight Report on Energy and Utilities

Industry research

Computing Security magazine review: Cognito 'worth its weight in gold'

Industry research

2018 Spotlight Report on Manufacturing

Industry research

2018 Black Hat Edition of the Attacker Behavior Industry Report

Industry research

2018 Spotlight Report on the Financial Services

Industry research

Product review: Ovum on-the-Radar Report

Industry research

2018 RSA Conference Edition of the Attacker Behavior Industry Report

Industry research

451 Research: Vectra debuts total Cognito Recall

Industry research

451 Research: Network traffic analytics can augment security operations expertise

Industry research

ESG Lab Review: Vectra Cognito automates security operations with AI

Industry research

EMA Research: 2019 Top 3 security analytics vendors decision guide

Industry research

2019 RSA Conference Edition of the Attacker Behavior Industry Report

Industry research

2019 Gartner Market Guide for Network Traffic Analysis

Industry research

2019 Spotlight Report on Healthcare

Industry research

IDC Innovators: AI-infused security solutions

Videos

Videos

Cube conversation: What Vectra Cognito does

Videos

Cube conversation: Security trends

Videos

Cube conversation: Why AI and why Vectra

Videos

The advent of Network Detection and Response in security operations

Videos

Cooper University Health Care talks about Vectra Cognito

Videos

Summary: 2019 Spotlight Report on Healthcare

Videos

Vectra partner Threatscape talks about the Cognito platform

Videos

Under Armour talks about Vectra Cognito

Videos

Vectra partner LC Systems talks about the Cognito platform

Videos

Kronos talks about Vectra Cognito

Videos

Securing AWS deployments with Vectra Cognito

Videos

The Cube interview with Mike Banic at AWS re:Inforce 2019

Videos

InfoSecurity Europe 2019 Highlights

Videos

Real-world use cases of AI empowering threat hunting

Videos

The Texas A&M University System cuts threat investigations from days to minutes

Videos

HBO Latin America talks about Vectra Cognito

Videos

Automatically surface hidden attacks in real time with Cognito Detect

Videos

Conclusive threat hunting and incident investigations with Cognito Recall

Videos

Demo: Cognito Stream - Network metadata with an opinion

Videos

See how Cognito can transform you into a cybersecurity superhero

Videos

Detect and respond faster to hidden threats

Videos

Vectra Cognito dazzles attendees at Infosecurity 2018

Videos

Vectra exec discusses cryptocurrency mining on the CNBC Nightly Business Report

Videos

Demo: Cognito integration with CrowdStrike Falcon

Videos

Security Weekly #591 with Chris Morales

Videos

Machine learning fundamentals for cybersecurity professionals

Videos

Detecting cyberattacks in the data center

Videos

Defeating and abusing machine learning-based detection technologies

Videos

Shop Direct embarks on a journey to cognitive security

E-books

E-Books

What can you do with the Cognito platform?

E-Books

Cryptocurrency mining infographic and e-book

E-Books

Six critical attack vectors to detect in your data center and private cloud

E-Books

Minding the cybersecurity gap

E-Books

A new threat-detection model that closes the cybersecurity gap

E-Books

How cyberattackers evade threat signatures

Solution overviews

Solution overviews

How manufacturing organizations can reduce business risk from cyberattackers

Solution overviews

How financial institutions can stop cyberattacks in their tracks

Solution overviews

Protecting patient health and privacy from cybercriminals

Solution overviews

How pharmaceutical companies can protect valuable IP

Solution overviews

How medical device manufacturers can safeguard vital IP

Solution overviews

Protecting higher education networks from cyberthreats

Solution overviews

Detect threats faster in IT and OT networks with Vectra and Nozomi

On-demand webcasts

On-demand webcasts

Humans + AI = Security that thinks and recalls

On-demand webcasts

Is your blue team fast enough to win the race against attackers?

On-demand webcasts

A day in the life of a security operations center analyst

On-demand webcasts

Vectra Cognito integration with Phantom

On-demand webcasts

Frost & Sullivan: Myths and truths when detecting threats in IoT environments

On-demand webcasts

Scaling your SOC team: The Texas A&M University System

White papers

White papers

Threat detection and response in the cloud

White papers

How to improve ROI and operational efficiency for cybersecurity

White papers

How to augment security operations centers with AI

White papers

How Cognito is ideal for replacing IDS

White papers

The data science behind Cognito AI threat detection models

White papers

Surviving the ransomware pandemic

White papers

How to detect malicious covert communications

Product integration

Product integration

Integrating Cognito with VMware

Product integration

Integrating Cognito with CrowdStrike

Product integration

Integrating Cognito with Carbon Black

Product integration

Integrating Cognito with Micro Focus ArcSight

Product integration

Integrating Cognito with IBM QRadar

Product integration

Integrating Cognito with Splunk

Product integration

Integrating Cognito with Demisto

Product integration

Integrating Cognito with Splunk Phantom

Product integration

Integrating Cognito with Juniper firewalls

Product integration

Integrating Cognito with Gigamon

Product integration

Integrating Cognito with Ixia

Case studies

Case studies

CS - The University of Oklahoma
The University of Oklahoma: Tackling cyberthreats on campus

Case studies

CS - Bolton NHS Foundation Trust
Bolton NHS Foundation Trust: Staying focused on quality patient care

Case studies

CS - Mediclinic International
Mediclinic International: Using artificial intelligence to reduce cyber risk

Case studies

CS - Shop Direct
Shop Direct: Large online retailer minimizes business risk

Case studies

CS - DAQRI
DAQRI: Augmented Reality for the industrial workplace

Case studies

CS - Hydro Ottawa
Hydro Ottawa: Electricity distribution to homes and businesses

Case studies

CS - DZ BANK
DZ BANK: Achieving security and privacy

Case studies

Ardagh Group
The Ardagh Group: Faster detection and response to hidden cyberthreats

Case studies

CS - Tri-State
Tri-State Generation and Transmission: The power of protection

Case studies

CS - Vetropack Group
Vetropack Group: European glassmaker sees threats clearly

Case studies

CS - Texas A&M
The Texas A&M University System: An academic and research powerhouse

Case studies

CS - Anthony Collins Solicitors
Anthony Collins Solicitors: Protecting client confidentiality with NDR

Case studies

CS - Premier Securities Exchange in the U.S.
Premier U.S.-Based Securities Exchange

Case studies

CS - Specialty Chemicals and Advanced Materials
Specialty Chemicals and Advanced Materials

Case studies

CS - Online Gaming
AI-Driven Cybersecurity for Online Gaming Sites