Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

See How it Works

All companies have malware threats in their network

Some just don’t know it yet. That’s why Vectra focuses on identifying the malware threats that could make them the next Target. Read what the Wall Street Journal has to say on the subject. 

Read Article

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat. 

Watch Video

Detect unknown malware threats

Don’t let fear of the unknown keep you up at night. Sam Kamran of Riverbed Technology explains how Vectra protects against never-seen-before malware threats and provides intuitive, actionable reports throughout the attack lifecycle. 

Watch Video

Benefits

Easy

Up and running in minutes. Vectra learns everything it needs to know.

Real-time

Continuous malware threat monitoring instantly identifies any phase of an attack.

Prioritized

The Threat Certainty Index™ ensures you address the highest malware threat first.

Adaptive

Learns new malware threat behaviors and adapts to your ever-changing network.

Blog

The Hidden Risk of Not Detecting Bitcoin Mining
06 June 2014

On June 6th, Forbes reporter Kashmir Hill wrote about an NSF researcher who misused NSF-funded supercomputing resources to mine Bitcoin valued between $8,000 and $10,000. The article points to a student at London Imperial College and a researcher at Harvard University who are also alleged to have used their University’s computers to mine a similar virtual currency called Dogecoin. More

View More Blog Posts

News & Events

InfoSec pros worried BYOD ushers in security exploits, survey says
SC Magazine | 23 July 2014

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace. More

Firms turn blind-eye to BYOD policy
FierceMobileIT | 23 July 2014

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection. More

Vectra Networks: 79% of Orgs. Lack BYOD Policies
MSPmentor | 23 July 2014

New study shows malware protection is a requirement for mobile security. More

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices is a Top BYOD Security Concern in 2014
Vectra Press Release | 23 July 2014

Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More

10 Security Start-ups to Watch
Vectra Press Release | 21 July 2014

Vectra Networks has been named one of this year's hottest tech startups impacting the IT channel and technology industry. More

10 Security Start-ups to Watch
Network World | 30 June 2014

Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. More

Jim Messina Joins Vectra Networks Board of Directors
Vectra Press Release | 17 June 2014

Jim Messina, the founder and CEO of the Messina Group, a consulting firm with offices in Washington, D.C. and San Francisco, has joined Vectra's Board of Directors. More

Stop Allowing Your Security Strategy to Drain IT Resources
Computer Technology Review | 11 June 2014

Most organizations would say protecting high-value information and complying with regulations is a priority, but in practice, few businesses have enough IT security staff and resources to ensure that policies are defined and upheld, systems are secured, and users are trained. More

Information overload: Finding signals in the noise
CSO | 29 May 2014

As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored. More

Charles Giancarlo Joins Vectra Networks Board of Directors
Vectra Press Release | 28 May 2014

Charles Giancarlo, a Senior Advisor to Silver Lake Partners and previous Managing Director and Head of Value Creation, joins Vectra's Board of Directors. More

Enterprise Organizations Are Taking Steps to Improve Cybersecurity Analytics
Network World | 27 May 2014

Last week, online retail giant eBay announced that it was hacked. Large organizations realize that they have to do more to protect themselves from cybercrime and are exploring ways to block threats and/or reduce the attack surface across their networks. More

First Security Platform that Thinks
Security Daily | 5 May 2014

The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked. More

Vectra Delivers First Security Platform that Thinks—to Automatically Detect and Report Cyberattacks at Every Phase of the Attack
Vectra Press Release | 28 April 2014

Vectra X-series platform automatically prioritizes the attacks that pose the greatest risk, enabling organizations to stop attacks in progress. More

Industrial Computers Emerge as Another Heartbleed Worry
Re/code | 30 April 2014

As if there weren't a sufficient number of things to worry about related to the Heartbleed vulnerability disclosed earlier this month, you can now add this to the list: Many of the world's computers used to control and manage heavy industrial equipment may be vulnerable, too. More

New Firm Pitches Cybersecurity for Less Well-Heeled
The Wall Street Journal | 27 March 2014

Some big-name former Washington officials are backing a new cybersecurity company that seeks to help less-well-heeled clients. Vectra uses an approach en vogue: Identifying hackers already in the system rather than trying to keep them out. More

Security startup Vectra Networks steps out of the shadows with a chunky $18M
VentureBeat | 27 March 2014

Vectra locked down $17.8 million in funding and is supported by a serious brain trust on the advisory board. More

Video: How Can Consumers Keep Their Data Safer?
The Wall Street Journal | 24 March 2014

With increased attention focused on data breaches in recent months, many have been left to wonder what practical steps consumers and companies could take to be more secure. The Wall Street Journal's Danny Yadron interviews a panel of experts on the subject. More

Target Breach: Vendors, you're not wrestlers, and this isn't the WWE
Forrester | 14 May 2013

Hindsight is 20/20. It's time to differentiate and disrupt the entire space with a new novel approach. More

Target CIO Takes the Fall
The Wall Street Journal | 5 March 2014

Target Corp. CIO Beth Jacob resigns as Target launches an overhaul of its network security in the wake of a massive security breach. More

Kleiner's Ted Schlein on Cyber Risk: 'It Only Gets Worse'
The Wall Street Journal | 4 February 2014

If it feels like you just aren't making any progress in the battle against cyber risks, that's because you're not. More

Reporting From the Web's Underbelly
The New York Times | 16 February 2014

Brian Krebs, writer of the cybercrime blog Krebs on Security, was the first to reveal the data breach at Target and other retailers last year. More

Adding Up the Costs of Data Breaches
The New York Times | 28 January 2014

The world of electronic credit and payments opens up companies to more and more thefts of financial information. More

View All News & Events

Upcoming Events

IT Roadmap, Boston

17 July 2014 – Hynes Convention Center, Boston

Join us in Boston at IT Roadmap for an opportunity to explore technologies, trends and solutions that are shaping the next-generation enterprise in one day and one convenient place. Register today.

IT Roadmap, New York

6 August 2014 – Jacob Javits Convention Center, New York City

Join us in New York City for IT Roadmap and experience a full day of unbiased perspectives from analysts, industry leaders and practitioners, integrated learning in workshops, keynotes and breakout sessions, and networking opportunities with regional IT peers. Register today.