Datasheets

How Vectra addresses CIS Critical Security Controls (CSC) 7.1

By using data science, machine learning and behavioral traffic analysis, Cognito reveals the hidden, fundamental attack behaviors that cyber criminals must perform in order to succeed.

The intelligence in Cognito learns normal network traffic patterns and host behaviors, which makes malicious attack behaviors stand out – even in encrypted traffic.

Always-learning threat detection models pinpoint attackers automatically and in real time over hours, days and weeks, correlates their malicious behaviors with hosts that are under attack, and anticipates their next move.

The Critical Security Controls (CSCs) developed through federal and community efforts, coordinated by the SANS Institute and maintained by the Center forInternet Security (CIS), are designed to mitigate modern attack profiles.

Download
How Vectra addresses CIS Critical Security Controls (CSC) 7.1
Datasheets
How Vectra addresses CIS Critical Security Controls (CSC) 7.1

You may also be interested in:

No items found.