Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

See How it Works

BYOD ushers in security exploits

Detecting malware on BYOD and mobile devices is a requirement for 60% of organizations according to the second annual report on BYOD and Mobility Security from the Information Security Community on LinkedIn. 

Get the Report

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat. 

Watch Video

Detect unknown malware threats

Don’t let fear of the unknown keep you up at night. Sam Kamran of Riverbed Technology explains how Vectra protects against never-seen-before malware threats and provides intuitive, actionable reports throughout the attack lifecycle. 

Watch Video



Up and running in minutes. Vectra learns everything it needs to know.


Continuous malware threat monitoring instantly identifies any phase of an attack.


The Threat Certainty Index™ ensures you address the highest malware threat first.


Learns new malware threat behaviors and adapts to your ever-changing network.


The Hidden Risk of Not Detecting Bitcoin Mining
06 June 2014

On June 6th, Forbes reporter Kashmir Hill wrote about an NSF researcher who misused NSF-funded supercomputing resources to mine Bitcoin valued between $8,000 and $10,000. The article points to a student at London Imperial College and a researcher at Harvard University who are also alleged to have used their University’s computers to mine a similar virtual currency called Dogecoin. More

View More Blog Posts

News & Media

BYOD Programs Leave Several Security Holes Open
eWeek | 25 July 2014

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey. More

3 steps to a more secure BYOD program
FierceCIO | 25 July 2014

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds. More

Survey Roundup: Culture Change Top Compliance Goal
Wall Street Journal | 25 July 2014

Ben DiPietro of the WSJ looks at some recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn. More

Are IT groups really ready for BYOD security challenges?
NetworkWorld | 24 July 2014

LinkedIn survey finds enterprise mobility still in infancy. More

More Exploits Expected to Enter Organizations via Mobile Devices
Mobile Marketing Watch | 24 July 2014

The Second Annual BYOD & Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal. More

How organizations deal with BYOD and mobile security
Help Net Security | 24 July 2014

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations. More

InfoSec pros worried BYOD ushers in security exploits, survey says
SC Magazine | 23 July 2014

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace. More

Firms turn blind-eye to BYOD policy
FierceMobileIT | 23 July 2014

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection. More

Vectra Networks: 79% of Orgs. Lack BYOD Policies
MSPmentor | 23 July 2014

New study shows malware protection is a requirement for mobile security. More

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices is a Top BYOD Security Concern in 2014
Vectra Press Release | 23 July 2014

Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More

Vectra Networks Recognized by CRN as a 2014 Emerging Vendor
Vectra Press Release | 21 July 2014

Vectra Networks has been named one of this year's hottest tech startups impacting the IT channel and technology industry. More

Defense in Depth for Advanced Threat Protection
Infosec Island | 9 July 2014

Defense in Depth is practical strategy and "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. More

10 Security Start-ups to Watch
Network World | 30 June 2014

Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. More

Jim Messina Joins Vectra Networks Board of Directors
Vectra Press Release | 17 June 2014

Jim Messina, the founder and CEO of the Messina Group, a consulting firm with offices in Washington, D.C. and San Francisco, has joined Vectra's Board of Directors. More

Stop Allowing Your Security Strategy to Drain IT Resources
Computer Technology Review | 11 June 2014

Most organizations would say protecting high-value information and complying with regulations is a priority, but in practice, few businesses have enough IT security staff and resources to ensure that policies are defined and upheld, systems are secured, and users are trained. More

Information overload: Finding signals in the noise
CSO | 29 May 2014

As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored. More

Charles Giancarlo Joins Vectra Networks Board of Directors
Vectra Press Release | 28 May 2014

Charles Giancarlo, a Senior Advisor to Silver Lake Partners and previous Managing Director and Head of Value Creation, joins Vectra's Board of Directors. More

Enterprise Organizations Are Taking Steps to Improve Cybersecurity Analytics
Network World | 27 May 2014

Last week, online retail giant eBay announced that it was hacked. Large organizations realize that they have to do more to protect themselves from cybercrime and are exploring ways to block threats and/or reduce the attack surface across their networks. More

First Security Platform that Thinks
Security Daily | 5 May 2014

The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked. More

Vectra Security Appliances Use Data Science to "Think"
Tom's IT Pro | 1 May 2014

Vectra differentiates real threats from noise, and as an attack intensifies, the Vectra platform reports updates in real time. More

Vectra Delivers First Security Platform that Thinks—to Automatically Detect and Report Cyberattacks at Every Phase of the Attack
Vectra Press Release | 28 April 2014

Vectra X-series platform automatically prioritizes the attacks that pose the greatest risk, enabling organizations to stop attacks in progress. More

Industrial Computers Emerge as Another Heartbleed Worry
Re/code | 30 April 2014

As if there weren't a sufficient number of things to worry about related to the Heartbleed vulnerability disclosed earlier this month, you can now add this to the list: Many of the world's computers used to control and manage heavy industrial equipment may be vulnerable, too. More

View All News & Media

Upcoming Events

ISE Lion's Den and Jungle Lounge Event

6 August 2014, 3:00-6:30PM – Vdara Hotel & Spa at Aria Las Vegas

The ISE® Lions represent the brightest minds in security and they are hungry for emerging technology solutions to implement within their enterprises. The Jungle Lounge will offer you an opportunity to learn more about these emerging companies and network with key members of the IS community. Register today.

IT Roadmap, New York

6 August 2014 – Jacob Javits Convention Center, New York City

Join us in New York City for IT Roadmap and experience a full day of unbiased perspectives from analysts, industry leaders and practitioners, integrated learning in workshops, keynotes and breakout sessions, and networking opportunities with regional IT peers. Register today.