Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.


Detect insider threats proactively

Community Threat Analysis puts your organizations key assets at the center of real-time investigations of insider and targeted attacks.


Ever wonder what an attacker does inside your network?

Read the first industry report that studies what attackers did once they breach the perimeter security at financial, technology, legal and high-education organizations.


Targeted attacks

Learn how targeted attacks work and how Vectra detects attacks that evade perimeter security, and protects users from targeted attacks for which signatures and reputation lists have very limited efficacy.


BYOD ushers in security exploits

Detecting malware on BYOD and mobile devices is a requirement for 60% of organizations according to the second annual report on BYOD and Mobility Security from the Information Security Community on LinkedIn.


Getting a clear picture of a computer network’s security

With Vectra, you can quickly find out what’s inside the network, with an advanced degree of precision, so that CISOs don’t have to spend all their time chasing false leads.

Read the NYT Blog Coverage

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat.




Up and running in minutes. Vectra learns everything it needs to know.


Continuous malware threat monitoring instantly identifies any phase of an attack.


The Threat Certainty Index™ ensures you address the highest malware threat first.


Learns new malware threat behaviors and adapts to your ever-changing network.


The Carbanak APT - Redefining Banking Malware
19 February 2015

Carbanak is a full-fledged APT campaign focused on infiltrating the banks themselves and stealing money directly from the bank, not its customers. The Carbanak attackers were both clever enough to remain hidden in the network and patient enough to learn precisely how to steal money based on the inner workings of the targeted bank. More

View More Blog Posts

News & Media

Breaking news from DARPA
The Cyberwire | 27 February 2015

The Christian Science Monitor's new Passcode cyber news service concluded its launch yesterday with a conference devoted to "the future of cybersecurity innovation." Co-sponsored by Invincea and Vectra, the session focused on DARPA's Plan X as an instance of what such innovation might look like. More

Does your security think?
Christian Science Monitor | 26 February 2015

Vectra Networks’ Mike Banic outlines how to package experience, skills and ingenuity of a security analyst into "Analyst as Software" for any company regardless of the size of their security team, at the Future of Cybersecurity Innovation event, February 26, 2015. More

High Risk, High Reward: The Ups And Downs Of Security Startups
CRN | 26 February 2015

A new wave of disruptive security startups are redrawing the battle lines in the growing conflict between cybercriminals and corporate America. For solution providers, the risks of partnering with these upstarts is high. But so are the rewards. More

Behavioral Analysis Could Have Prevented The Anthem Breach
Forbes | 24 February 2015

There’s a universal truth regarding every cyber attack: attack behavior never appears normal. This seemingly simple fact holds true whether the attack was executed by a first-timer or perpetrated by a nation-state and is crucial to preventing future information security breaches like Anthem’s. More

Banking Malware Redefined
Security Week | 18 February 2015

For several years now, cybercrime in the financial sector was synonymous with banking botnets such as Zeus and Carberp. By and large, these malware families and their many descendants worked by infecting banking customer’s computers and either stealing passwords or manipulating online banking sessions to steal funds. More

AUDIO: Obama Convenes Stanford Summit on 'Evil Layer Cake' of Cyberthreats
KQED; The California Report | 13 February 2015

The Internet has turned into a pretty rough neighborhood, and as we've seen in a steady stream of media reports, the bad guys are out there, hacking into computer systems as often as they can. This risk of getting hacked and what to do about it was why President Obama came to Stanford University Friday, to convene a White House summit on cybersecurity. More

VIDEO: Vectra CEO Hitesh Sheth Comments on Upcoming White House Summit on Cybersecurity
NBC News; KNTV | 12 February 2015

The White House Summit on Cybersecurity and Consumer Protection will be held at Stanford University on Friday, Feb. 13. Hitesh Sheth, president and CEO of Vectra Networks, will be attending the summit to talk shop. More

Vectra Networks’ CEO Invited to Participate in White House Summit on Cybersecurity and Consumer Protection
Vectra Press Release | 12 February 2015

Vectra Networks announces that two of its executives have been invited and will participate in the White House Summit on Cybersecurity and Consumer Protection being held at Stanford University on Friday, Feb. 13. More

Will 2015 Be The Year of Information Security Disruption?
CRN | 9 February 2015

With most intrusion prevention systems and next-generation firewalls focused primarily on detecting the initial exploit, Vectra Networks takes the approach of uncovering reconnaissance activity, lateral movement within the network and brute-force attacks into systems and processes that could signal acquiring data and uploading it to a remote server. More

Cybersecurity should be everyone’s concern
San Francisco Chronicle | 8 February 2015

Hitesh Sheth, CEO of Vectra Networks, offers a few truths about cybersecurity to the nontech business leadership. More

IT Security Game Becomes a Race Against Time
Channel Insider | 28 January 2015

Customers are often astonished by the degree to which malware has penetrated their firms, and that is resulting in a rush to add better security. More

Vectra Networks correlates odd bits of user behavior that signal an attack in progress
Network World | 9 January 2015

By correlating seemingly odd bits of user activity that individually might be ignored, Vectra formulates a "threat certainty" score that prioritizes events and, ideally, triggers alerts to security operations people before any communications leaves the company. More

Data science and machine learning will fight cyber-attacks, says Vectra Networks: 2015 Tech Predictions
SiliconANGLE | 31 December 2014

Vectra VP of Marketing Mike Banic predicts data science and machine learning will become the focus of the fight on cyber-attacks, cyber security will get social, and new entrants will continue to disrupt the cyber security market. More

New products of the week 12.22.201
Network World | 22 December 2014

Our roundup of intriguing new products from companies such as Dell, CloudBerry and Vectra (See Slide 16). More

Vectra Networks X-Series Platform IDs Real-Time Threats
eWeek | 22 December 2014

Real-time cyber-attack detector Vectra Networks has introduced a real-time detection platform for insider and targeted threats. More

Breach Detection, Sony Entertainment and Vectra Networks…
EMA Blogs | 19 December 2014

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. More

Put the Insider Threat in Your Sights
InfoTech | 15 December 2014

Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations. More

Vectra Networks Released Real-Time Detection Platform for Protection Against Insider and Targeted Threats
PCC Mobile Broadband | 15 December 2014

Vectra Networks has released an updated real-time detection platform - X-series platform - aimed for insider and targeted threats detection. More

Vectra Launches Real-Time Detection Platform To Curb Insider Threat
Homeland Security Today | 11 December 2014

Vectra Networks announced release of a real-time detection platform to protect organizations and government agencies from insider and target threats. More

Tracking Cyber Threats from Inside a Company (video)
BloombergTV's Taking Stock | 10 December 2014

CEO Hitesh Sheth tells BloombergTV's Pimm Fox how Community Threat Analysis dynamically creates a clear picture of typical network access through the entire corporate network, identifying anomalies and flagging unauthorized access to documents, data and intellectual property, making it an effective way of recognizing insider attacks. More

Vectra Networks Launches Real Time Detection
The VAR Guy | 10 December 2014

Vectra Networks has released its updated X-series platform, the first real-time detection solution designed to discover insider and targeted threats. The new platform promises to help organizations gain instant visibility into potential threats by leveraging a combination of dynamic community threat analysis and real-time detection of cyberattacks. More

Vectra Networks Updates Threat Detection Platform
Security Week | 10 December 2014

The Vectra X-series platform is designed to detect sophisticated threats by using a combination of security research, data science and machine learning. According to the company, the product is capable of detecting attacks on all operating systems, applications and devices regardless of the method and location of the initial delivery. More

View All News & Events

Upcoming Events

Data Connectors, Central New Jersey Tech-Security Conference

12 March 2015 8 AM - WESTIN PRINCETON AT FORRESTAL VILLAGE 201 Village Boulevard Princeton, NJ 08540

The Central New Jersey Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately Register today.

Insider Threat Summit 2015

16 March 2015 to 17 March 2015
1 Old Golf Course Road Monterey, California, USA, 93940-4908

The focus of the Insider Threat 2015 Summit is to discuss personnel security issues including cyber security challenges and capabilities, continuous evaluation of privileged identities and technical physical security considerations. A heightened awareness of insider threats due to numerous newsworthy attacks and unauthorized leaks has brought us together for one main purpose: To better understand security challenges in order to better defend against insider threats. Register today.