17 July 2014 – Hynes Convention Center, Boston
Join us in Boston at IT Roadmap for an opportunity to explore technologies, trends and solutions that are shaping the next-generation enterprise in one day and one convenient place. Register today.
Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.See How it Works
Some just don’t know it yet. That’s why Vectra focuses on identifying the malware threats that could make them the next Target. Read what the Wall Street Journal has to say on the subject.Read Article
The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat.Watch Video
Don’t let fear of the unknown keep you up at night. Sam Kamran of Riverbed Technology explains how Vectra protects against never-seen-before malware threats and provides intuitive, actionable reports throughout the attack lifecycle.Watch Video
Up and running in minutes. Vectra learns everything it needs to know.
Continuous malware threat monitoring instantly identifies any phase of an attack.
The Threat Certainty Index™ ensures you address the highest malware threat first.
Learns new malware threat behaviors and adapts to your ever-changing network.
On June 6th, Forbes reporter Kashmir Hill wrote about an NSF researcher who misused NSF-funded supercomputing resources to mine Bitcoin valued between $8,000 and $10,000. The article points to a student at London Imperial College and a researcher at Harvard University who are also alleged to have used their University’s computers to mine a similar virtual currency called Dogecoin. More
Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace. More
Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection. More
New study shows malware protection is a requirement for mobile security. More
Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More
Vectra Networks has been named one of this year's hottest tech startups impacting the IT channel and technology industry. More
Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. More
Jim Messina, the founder and CEO of the Messina Group, a consulting firm with offices in Washington, D.C. and San Francisco, has joined Vectra's Board of Directors. More
Most organizations would say protecting high-value information and complying with regulations is a priority, but in practice, few businesses have enough IT security staff and resources to ensure that policies are defined and upheld, systems are secured, and users are trained. More
As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored. More
Charles Giancarlo, a Senior Advisor to Silver Lake Partners and previous Managing Director and Head of Value Creation, joins Vectra's Board of Directors. More
Last week, online retail giant eBay announced that it was hacked. Large organizations realize that they have to do more to protect themselves from cybercrime and are exploring ways to block threats and/or reduce the attack surface across their networks. More
The Vectra X-series platform can detect attacks at every phase of a persistent attack, regardless of how the attack enters an organization’s network and the operating system, application or device being attacked. More
Vectra X-series platform automatically prioritizes the attacks that pose the greatest risk, enabling organizations to stop attacks in progress. More
As if there weren't a sufficient number of things to worry about related to the Heartbleed vulnerability disclosed earlier this month, you can now add this to the list: Many of the world's computers used to control and manage heavy industrial equipment may be vulnerable, too. More
Some big-name former Washington officials are backing a new cybersecurity company that seeks to help less-well-heeled clients. Vectra uses an approach en vogue: Identifying hackers already in the system rather than trying to keep them out. More
Vectra locked down $17.8 million in funding and is supported by a serious brain trust on the advisory board. More
With increased attention focused on data breaches in recent months, many have been left to wonder what practical steps consumers and companies could take to be more secure. The Wall Street Journal's Danny Yadron interviews a panel of experts on the subject. More
Hindsight is 20/20. It's time to differentiate and disrupt the entire space with a new novel approach. More
Target Corp. CIO Beth Jacob resigns as Target launches an overhaul of its network security in the wake of a massive security breach. More
If it feels like you just aren't making any progress in the battle against cyber risks, that's because you're not. More
Brian Krebs, writer of the cybercrime blog Krebs on Security, was the first to reveal the data breach at Target and other retailers last year. More
Join us in New York City for IT Roadmap and experience a full day of unbiased perspectives from analysts, industry leaders and practitioners, integrated learning in workshops, keynotes and breakout sessions, and networking opportunities with regional IT peers. Register today.