Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

SEE HOW IT WORKS

Targeted attacks

Learn how targeted attacks work and how Vectra detects attacks that evade perimeter security, and protects users from targeted attacks for which signatures and reputation lists have very limited efficacy.

WATCH VIDEO

BYOD ushers in security exploits

Detecting malware on BYOD and mobile devices is a requirement for 60% of organizations according to the second annual report on BYOD and Mobility Security from the Information Security Community on LinkedIn.

GET THE REPORT

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat.

WATCH VIDEO

$25M raised in the battle against cyber attacks

READ THE NEWS

Benefits

Easy

Up and running in minutes. Vectra learns everything it needs to know.

Real-time

Continuous malware threat monitoring instantly identifies any phase of an attack.

Prioritized

The Threat Certainty Index™ ensures you address the highest malware threat first.

Adaptive

Learns new malware threat behaviors and adapts to your ever-changing network.

Blog

Catch Attackers Attempting to Shellshock You
9 September 2014

Newly discovered vulnerabilities like Shellshock, and Heartblees before it, don’t need to induce a gut-wrenching moment of fear or panic if you take steps to effectively protect your organizations. More

View More Blog Posts

News & Media

Cyber Security Goes Mobile
Vectra Press Release | 20 October 2014

Mobile technology advances have brought about the once-unfathomable prospect that wireless security is at least on a par with traditional computing and networking systems -- the very ones currently fending off an unprecedented wave of cyberattacks. More

Vectra Networks Joins New A10 Security Alliance to Jointly Detect Attacks Obfuscated in Encrypted SSL Traffic
Vectra Press Release | 14 October 2014

Program Membership Validates Interoperability between Leading Solutions for Organizations to Detect and Address Network Breaches with Automated Detection and SSL Traffic Visibility More

Detecting cyber attacks in a mobile and BYOD organization
Vectra Press Release | 14 October 2014

Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices. This application note sets out to explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a flexible and high efficacy solution for detecting any phase of an ongoing attack on mobile devices regardless of device type, operating system or applications installed. More

New Bash Bugs Surface
Vectra Press Release | 29 September 2014

If you patched your Linux-based systems before 1:11 a.m. Eastern Daylight Time yesterday for the major Shellshock vulnerability in the Bash function, your work is not done here yet. New bugs have been reported in Bash, so it's probably time to patch again, security experts warn. More

Home Depot breach bigger than Target at 56 million cards
Vectra Press Release | 18 September 2014

Vectra CEO Hitesh Sheth says that the recent Home Depot breach exposes a serious security weakness, noting that the company said hackers used unique, custom-built malware to compromise up to 56 million payment cards. More

Why Breach Detection Is Your New Must-Have, Cyber Security Tool
Vectra Press Release | 6 September 2014

It's time for CIOs to start focusing on the next line of defense in the war against cyber crime: an emerging area called breach detection, which focuses on identifying long-tail intrusions after they happen and mitigating their damage, partly through the use of big-data technologies. Your company’s information security may depend on it. More

Getting a Clear Picture of a Computer Network’s Security
Vectra Press Release | 30 August 2014

Security experts say the only hope of protecting corporate networks from hackers is something the industry calls “defense in depth.” The phrase simply means that plugging in one traditional defense — antivirus software, or a firewall, is no longer going to cut it. More

INTERVIEW: Vectra Networks to use Series C to grow real-time cyber threat detection
Vectra Press Release | 27 August 2014

Vectra Networks, Inc. announced on August 5 it had raised a new $25 million round of funding to boost sales and marketing for its behavior-based cyber security solution. More

Cyber Attacks: We're Fighting an Asymmetric War
Vectra Press Release | 26 August 2014

Cybercriminals' ability to attack is outpacing our ability to defend. We are fighting an asymmetric war. Resources are one challenge, but so are the defensive tactics. Organizations rely on security best practices and products that were developed to counter a different threat—long before the rise of mobility, the cloud and well-organized criminals. More

Taking Stock
Vectra Press Release | 19 August 2014

Vectra Networks CEO Hitesh Sheth and CrowdStrike CEO George Kurtz comment on the Chinese hackers that stole personal information from 4.5 million patients of Community Health Systems and discuss how vulnerable U.S. companies are to hackers. They speak with Pimm Fox on "Taking Stock." (video) More

Vectra Networks Raises $25M to Empower Enterprises in Their Battle Against Cyber Attacks
Vectra Press Release | 5 August 2014

Accel Partners leads Series C funding with Eric Wolford joining the Vectra board; Latest financing further validates Vectra’s unique approach of detecting and prioritizing cyber attacks in real time. More

Taking Stock
Vectra Press Release | 5 August 2014

Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy. (video) More

Vectra Networks Raises $25M to Stop Cyberattacks in Progress
Vectra Press Release | 5 August 2014

Cybersecurity vendors are being forced to recognize that cybercriminals have become so good at finding new ways to penetrate corporate and government IT systems that they can no longer be entirely blocked, and one of them, Vectra Networks Inc., has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first. More

Vectra Networks detects cyber attacks in real-time, raises $25M
Vectra Press Release | 5 August 2014

Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials. More

Vectra Networks raises $25M to fend off cyberattacks in real time
Vectra Press Release | 5 August 2014

Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital. More

BYOD Programs Leave Several Security Holes Open
Vectra Press Release | 25 July 2014

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey. More

3 steps to a more secure BYOD program
Vectra Press Release | 25 July 2014

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds. More

Survey Roundup: Culture Change Top Compliance Goal
Vectra Press Release | 25 July 2014

Ben DiPietro of the WSJ looks at some recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn. More

Are IT groups really ready for BYOD security challenges?
Vectra Press Release | 24 July 2014

LinkedIn survey finds enterprise mobility still in infancy. More

More Exploits Expected to Enter Organizations via Mobile Devices
Vectra Press Release | 24 July 2014

The Second Annual BYOD & Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal. More

How organizations deal with BYOD and mobile security
Vectra Press Release | 24 July 2014

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations. More

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices is a Top BYOD Security Concern in 2014
Vectra Press Release | 23 July 2014

Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More

View All News & Events

Upcoming Events

ISSA SoCal Symposium

30 October 2014 7:30 AM - Hilton Long Beach & Executive Meeting Center, Long Beach, California

The 29th Annual 2014 ISSA SoCal Security Symposium features over 30 vendor exhibits and several industry experts discussing current security issues such as eDiscovery, cloud security, threat vectors, mobile security, and much more. Register today.

Data Connectors, Phoenix Tech-Security Conference

6 November 2014 8:15 AM - Hilton Phoenix Mesa, 1011 West Holmes Avenue, Mesa, AZ

Data Connectors’ Tech Security Conferences focus on the latest tech security products and services such as email security, wireless security, network and infrastructure security, compliance, cloud computing, VoIP and networking. Informative speaker sessions and sponsor exhibits help you keep up with the ever changing Information security industry. Register today.