Detect and mitigate cyberattacks with Vectra and VMware Carbon Black

Carbon Black
Carbon Black

Learn all about our partnership.

Download Integration Brief

The integration of Cognito® Detect from Vectra® with VMware Carbon Black Cloud™ Endpoint enables security teams to automate the detection of hidden cyber attackers in real time, while unifying network and endpoint context to quickly verify and isolate advanced threats in the enterprise.

Together, Cognito Detect and Carbon Black Cloud Endpoint solve the most persistent security problems facing enterprise organizations today: Finding and stopping active cyber attacks while getting the most out of limited time and manpower of IT security teams.

The need for a new approach to security

Modern cyber attackers can easily evade prevention security defenses at the network perimeter. Unable to rely solely on prevention defenses, security teams must manually investigate threats and sift through the noise in search of a weak signal.

In practice, this often means that cyberattacks are first detected and reported by an external third party, turning their discovery into a post-breach forensic drill rather than a proactive attack mitigation exercise.

A new model of threat detection

Cognito Detect from Vectra automates the detection of hidden cyberthreats by continuously analyzing all network traffic – from cloud and data center workloads to user and IoT devices – to detect the earliest signs of attacker behaviors.

In addition to automatically correlating detected threats with host devices that are under attack, Cognito Detect provides unique context about what attackers are doing and prioritizes threats that pose the biggest risk. This enables security teams to quickly focus their time and resources on preventing or mitigating loss.

Using artificial intelligence, Cognito Detect combines data science, machine learning and behavioral analytics to reveal the attack behaviors without signatures or reputation lists. Cognito Detect even exposes threats in encrypted traffic without using decryption.

Easily integrate network and endpoint context

When a threat is detected, Cognito Detect and CB Cloud Endpoint provide security teams with instant access to additional information for verification and investigation. Host identifiers and other hose device data from VMware CarbonBlack are automatically shown in the Cognito Detect UI.

Next, a single click allows security teams to easily pivot between the Cognito Detect UI and the CB Cloud Endpoint UI for the same host device or to securely connect directly to the host device using the CB Cloud Endpoint LiveResponse capability.

CB Cloud Endpoint easily reveals traits and behaviors of a threat that are only visible inside the host device, while CB Cloud does the same for cloud workloads. This enables security teams to quickly and conclusively verify a cyberthreat while also learning more about how the threat behaves on the host device – or in the cloud – itself.

Take action with Lockdown

In addition to reducing the time to investigate threats, Cognito Detect andCB Cloud Endpoint let security teams take swift, decisive action. Armed with network and endpoint context, security teams can quickly isolate compromised host devices from the network to halt cyberattacks and avoid data loss.

The Host Lockdown feature enables the Vectra Cognito platform to automatically disable hosts that demonstrate suspicious activity at the endpoint or through cloud apps. If analysts need to take matters into their own hands, they have the option to manually disable hosts during a security investigation. Disabling a host will significantly slow down an active attack by limiting an attacker’s access to additional resources. This drastically curtails the attack’s reach and gives theSecurity Operations Center (SOC) more time to investigate and remediate attacks.

Host Lockdown ensures that automation causes as little disruption as possible while giving you greater confidence that attackers are stopped in their tracks.

About Vectra

As a leader in network detection and response (NDR), Vectra® AI protects your data, systems and infrastructure. Vectra AI enables your SOC team to quickly discover and respond to would-be attackers —before they act.

Vectra AI rapidly identifies suspicious behavior and activity on your extended network, whether on-premises or in the cloud. Vectra will find it, flag it, and alert security personnel so they can respond immediately.

Vectra AI is Security that thinks®. It uses artificial intelligence to improve detection and response over time, eliminating false positives so you can focus on real threats.

About VMware Carbon Black

VMware Carbon Black has designed the most complete next-gen endpoint security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The VMware CarbonBlack Cloud™ Endpoint Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats.

The Platform

Vectra AI Platform

The integrated signal for extended detection and response (XDR)

Vectra AI Platform
MXDR Services
Technology Integrations
Attack Signal Intelligence
Ingest + Normalize + Enrich Data
Analyze + Detect + Triage
Attribute + Correlate + Prioritize
Investigate
Respond
Ingest + Normalize + Enrich Data
Analyze + Detect + Triage
Attribute + Correlate + Prioritize
Investigate
Respond

Close security gaps and outsmart attackers

with AI-powered detection for hybrid cloud

Leader in the 2025 Gartner® Magic Quadrant for NDR

36

AI patents

150+

AI models

12

MITRE references

Carbon Black
+
Vectra
OVERVIEW

Why integrate AWS and Vectra AI

AWS services protect configurations, control access, and monitor activity. But advanced attackers know how to exploit post-authentication blind spots. And they use them to compromise IAM roles, move laterally between accounts, and exfiltrate data.

Vectra AI equips you with the industry’s only AI-driven cloud detection and response solution purpose-built for AWS. It runs natively on AWS and integrates seamlessly with services like Amazon GuardDuty, AWS CloudTrail, AWS Security Lake, and AWS Bedrock. So you can stop advanced hybrid and multi-cloud attacks before they escalate.

Eliminate blind spots across your entire modern network
Eliminate blind spots across your entire modern network
CAPABILITIES

How Vectra AI and AWS deliver complete coverage

Together, Vectra AI and AWS close the post-authentication gap.

Expose attacks that bypass native controls

  • Detect IAM abuse, lateral movement, and data exfiltration after authentication

  • Spot stealthy attacker behaviors that blend into normal AWS activity

See across hybrid and multi-account environments

  • Correlate detections across VPCs, regions, and identities

  • Unify AWS-native findings with network and identity signals for a single view

Accelerate SOC efficiency

  • Make investigations 50% faster with rich metadata, entity attribution, and AI-driven triage

  • Identify 52% more potential threats

WHY VECTRA AI

Find the attacks AWS-native tools can’t 

The Vectra AI Platform detects and correlates behaviors across cloud, network, and identity to stop threats before they spread.

Vectra AI’s real-time data ingestion engine:

  • Monitors 13.3 million IPs daily

  • Processes 10 billion sessions per hour

  • Handles 9.4 trillion bits per second

Vectra AI’s real-time data ingestion engine
Modern approach to network detection and response

This modern approach to network detection and response:

  • Covers > 90% of MITRE ATT&CK techniques

  • Makes Vectra AI the most-referenced MITRE D3FEND vendor

To defend modern cloud environments

With AI-driven detections across cloud, network, and identity, you get full visibility and faster investigations — without added complexity.

See what customers say

Carbon Black

“In just a matter of days, our clients are able to achieve greater visibility, detection efficacy, and cut incident response times.”

Henrik Smit
Director, CyberOps, KPMG
Read More
Carbon Black

“Vectra AI significantly enhances our security posture, especially in our AWS and cloud environments, where its ease of configuration and curated detections allow us to address threats from day zero."

CISO
Luxury Goods Company
Carbon Black

"We are an AWS shop...The blind side that we had before Vectra was the lateral movement within the organization."

Mirza Baig
IT Security Manager, MPAC
Read More
FAQs

What to expect with Vectra AI and AWS

What does Vectra AI add to AWS security services?

Does this replace AWS-native security?

Will this add complexity to my AWS environment?

Which environments are covered?

See how Vectra AI strengthens your AWS workloads

Detect hidden threats, cut noise, and speed investigations across your AWS environment.

VECTRA AI and ZSCALER

Gain end-to-end visibility — north-south and east-west

Stop attacks across encrypted channels, private access, and hybrid environments

Leader in the 2025 Gartner® Magic Quadrant for NDR

36

AI patents

150+

AI models

12

MITRE references

Carbon Black
+
Vectra
OVERVIEW

Why integrate Zscaler with Vectra AI

Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) provide the essential SASE architecture you need for secure remote and hybrid work. But attackers still find blind spots. And they’ll use them to slip past prevention controls, remaining invisible to SASE alone.

The Vectra AI Platform ingests Zscaler traffic to detect hidden attacker behaviors across internet, private access, cloud, and IoT/OT. The result is complete visibility and faster investigations — without added complexity.

Eliminate blind spots across your entire modern network
Why Zscaler and Vectra
CAPABILITIES

How Vectra AI and Zscaler deliver a holistic view of network traffic

Together, Vectra AI and Zscaler bridge the gap between detection and protection for complete coverage across SASE environments.

Expose novel attacks

Detect evasive C2 and exfiltration attempts that slip past prevention controls.

  • Spend 37% less time identifying new attack use cases

  • Identify 52% more potential threats

See across users, apps, and devices

Correlate detections across cloud, on-premises, remote, and IoT/OT traffic for complete visibility.

  • Unify visibility across hybrid environments into a single centralized solution

  • Increase security team efficiency by 40%

Accelerate investigations

Enrich Zscaler telemetry with AI-driven context, streamlining SOC triage and threat hunting.

  • Cut triage time by 60% with AI-driven context

  • Cut manual investigation tasks by 50%

WHY VECTRA AI

Find the attacks others can’t

Legacy solutions prevent and control access, but advanced attackers still find ways in. The Vectra AI Platform sees and stops hidden attacks as they progress from network to identity to cloud.

Vectra AI’s real-time data ingestion engine:

  • Monitors 13.3 million IPs daily

  • Processes 10 billion sessions per hour

  • Handles 9.4 trillion bits per second

Vectra AI’s real-time data ingestion engine
Modern approach to network detection and response

This modern approach to network detection and response:

  • Covers > 90% of MITRE ATT&CK techniques

  • Makes Vectra AI the most-referenced MITRE D3FEND vendor

To fill security gaps across your modern network

Correlate signals across SASE, cloud, identity, and IoT to expose multi-vector hybrid attacks before they spread.

See what customers say

Carbon Black

“In just a matter of days, our clients are able to achieve greater visibility, detection efficacy, and cut incident response times.”

Henrik Smit
Director, CyberOps, KPMG
Read More
Carbon Black

“Vectra AI captures metadata at scale from all network traffic and enriches it with a lot of useful security information. Getting context up-front tells us where and what to investigate.”

Eric Weakland
Director of Information Security, American University
Read More
Carbon Black

“The Vectra AI Platform introduced innovative AI and machine learning capabilities, significantly enhancing our ability to detect and respond to cyberattacks.”

Andrea Licciardi
Cybersecurity Manager, MAIRE
Carbon Black

"The Zscaler and Vectra AI integration gives us the ability to analyze, detect and respond to threats with precision – whether it’s identifying east-west movement within our environment or mitigating encrypted network anomalies in real time."

John Opala
VP and CISO,  HanesBrands Inc
Read More
FAQs

What to expect with Vectra AI and Zscaler

How does Vectra AI strengthen Zero Trust enforcement?

What types of detections does the integration enable?

Does the solution add complexity to existing Zscaler deployments?

Which environments are covered?

See how Vectra AI expands your SASE coverage

Strengthen zero trust with AI-driven detection, investigation, and response.