Vectra Threat Labs discovers a critical Microsoft Windows vulnerabilityFind out how
Learn more now
Attackers know when they're being watched and are blending in with users and common network traffic.Download the Report
Up and running in minutes. Vectra learns everything it needs to know.
Continuous threat monitoring instantly identifies any phase of a cyber attack.
The Threat Certainty Index™ prioritizes the most serious threats in your network.
Learns new threat behaviors and adapts to your ever-changing network.
While digging and reversing my way through the Equation Group dump, I’ve come across a few interesting pieces that probably are not getting the attention they deserve. While a lot of the initial research has focused on the potential 0-days, the dump also gives a glimpse into the backbone tools and operational methods of a serious hacking group. More
"By calling it 'state sponsored' organisations, are attempting to deflect the discussion from the types of tools used and their failed defences, and to posit that they had no chance of protecting their data because 'the government did it'," said Günter Ollmann, chief security officer at Vectra Networks. More
Some analysts warn that "state sponsored" can be a vague term. It might also be an easy excuse to deflect blame for a company's own security lapses, by suggesting it had no hope of defeating hackers who had all the resources of a government intelligence agency behind them, warned Günter Ollmann, chief security officer at Vectra Networks, a San Jose, California, security firm. More
Matt Walmsley, director, EMEA at Vectra Networks comments on the Yahoo! hack: “It’s extremely concerning just how many organisations are still blissfully unaware of huge data breaches taking place within their network infrastructure. Research shows that only about two out of 10 data breaches are detected internally – leaving around 80 percent of data breaches detected by external discovery and third party agencies.” More
Vectra Networks möchte mit einer neuen Lösung versteckte Sicherheitslücken in Netzwerkinfrastrukturen wie Firewalls, Server, Router und Switches aufdecken. Das berichtet das Fachmagazin Funkschau. Demnach ermöglicht diese Sicherheitslösung branchenweit erstmalig die erforderliche Transparenz, den Kontext und die Intelligenz, um selbst hochentwickelte Angriffe auf das Rechenzentrum aufzudecken. More
While U.S. officials have suggested designating election systems as critical infrastructure after the Democratic National Committee hack, 62% of Passcode Influencers say it's not enough. “Unless we move beyond a declaration and into actual protection, proclamation would act more like an invitation to global hackers," said Vectra CTO Günter Ollmann. More
We need to recognize the uniqueness of the data center and the threats they face, while recognizing that this uniqueness does not make them separate. Look for the attack techniques that are unique to the data center, while retaining the context of everything we've learned in the campus. This requires some planning, but is achievable. More
Günter Ollmann, CSO at Vectra Networks, said, "Instead of buying hardware and appliances with a three-to-five-year depreciation lifecycle, they are buying a service. They are now paying, typically, based around number of servers or users being protected. Their security spend can change drastically in Capex and Opex." More
The more places your information is stored and the more people have access to it, the more potential points of attack there are, said Vectra CEO Hitesh Sheth. Encrypted databases don't mean much if your financial advisor takes work home on an unencrypted thumb drive or an office assistant falls for a phishing email. More
Vectra's prediction that 2016 would see ransomware "focus more on holding enterprise assets hostage and less on individuals," is supported by a recent report that shows nearly 40% of businesses surveyed experienced a ransomware attack in the last year. Over a third lost revenue and 20% had to completely cease business operations. More
Vectra, which has been focusing on campus networks, is expanding its reach to the data center and the public cloud. The company is among a new wave of security companies that detect attacks in progress. Vectra's new strategies detect bad behavior because intruders in the data center don’t have the same goals as intruders in the campus network do. More
Vectra Networks bietet nun auch Rechenzentren einen umfassenden Schutz vor Hackerangriffen. Das berichtet das Fachmagazin LANline. More
India’s third largest IT services firm has recently partnered with Silicon Valley-based cyber security firm Vectra Networks and Israel-based IntSights Cyber Intelligence to bolster and expand its threat intelligence-as-a-service offering. More
A challenge facing virtualised data centres is securing the physical infrastructure on which the virtual or shared service sits. The point of attack is the area outside of the hypervisor and virtual machines, utilising support and management protocols such as IPMI. It is the physical infrastructure – the servers, switches and firewalls – that is being targeted. More
Security experts from Vectra Networks have taken a closer look at one of the files leaked by the Shadow Brokers, a nefarious group that claims to have stolen hacking tools from the Equation Group, a US-based cyber-espionage actor that some security vendors say is the NSA. More
Vectra Networks, ein führender Anbieter von Lösungen zur automatisierten Echtzeit-Erkennung von Cyberangriffen, stellt heute den branchenweit ersten umfassenden Ansatz zur Aufdeckung von versteckten Sicherheitslücken in Netzwerkinfrastrukturen wie Firewalls, Server, Router und Switches vor. Die Sicherheitslösung adressiert Hintertüren für Cyberangriffe in privaten Unternehmensrechenzentren und Public Clouds. More
Vectra Networks today announced the industry’s first comprehensive approach to detect backdoors embedded in network infrastructure including firewalls, servers, routers and switches, found at the heart of private enterprise data centers and public clouds. More
Wipro Limited, today announced a partnership with Vectra Networks, a Silicon Valley-based cybersecurity company that provides automated threat management solutions for real-time detection of in-progress cyber attacks. More
Does behavioural analytics fit into the concept of machine learning? Vectra EMEA Director Matt Walmsley comments, "Behavioural analytics is a powerful component in machine learning, based on real-time threat detection and management. By focusing on behaviours rather than signatures, it's possible for previously unknown threats to be identified." More
Matt Walmsley, EMEA director at Vectra, says “channel partners are looking to augment and build out multi-layered offerings and service delivery capabilities as they transform their business as traditional resellers to being very services led. That's why we've gone out and created technology alliances." More
With all the effort expended on securing virtualized environments, one of the biggest vulnerabilities is in hardware, says Wade Williamson, Vectra director of threat analytics. This is true not just in the data center, but in our laptops. The underlying firmware, controllers, and BIOS can undercut what we think we know about a device. More
Following a data breach at HEI Hotels & Resorts, Vectra CSO Günter Ollmann explains why the hospitality industry continues to serve as a target of attack. Because the hospitality industry “depends heavily on transient and temporary staff, they are more prone to physical subversion of their systems.” More
Matt Walmsley, EMEA director at Vectra, comments on the Sage breach, “The simplest way to access unauthorised systems is through the acquisition and misuse of legitimate credentials. Other 'insiders' may seek to escalate their privileges or broaden the hosts and services they wish to access for nefarious reasons." More
The Boston Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.