$25M raised in the battle against cyber attacks

Read the News

Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

See How it Works

BYOD ushers in security exploits

Detecting malware on BYOD and mobile devices is a requirement for 60% of organizations according to the second annual report on BYOD and Mobility Security from the Information Security Community on LinkedIn. 

Get the Report

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat. 

Watch Video

Detect unknown malware threats

Don’t let fear of the unknown keep you up at night. Sam Kamran of Riverbed Technology explains how Vectra protects against never-seen-before malware threats and provides intuitive, actionable reports throughout the attack lifecycle. 

Watch Video



Up and running in minutes. Vectra learns everything it needs to know.


Continuous malware threat monitoring instantly identifies any phase of an attack.


The Threat Certainty Index™ ensures you address the highest malware threat first.


Learns new malware threat behaviors and adapts to your ever-changing network.


Vectra detections will enable Juniper to block cyberattacks via API
09 September 2014

Vectra participated in Juniper Networks' recent announcement on the expansion of Spotlight Secure threat intelligence platform. Part of the technology expansion includes an open API that enables the Vectra X-series to communicate detection of in-progress cyber attacks to Juniper’s Spotlight Secure platform. More

View More Blog Posts

News & Media

Getting a Clear Picture of a Computer Network’s Security
New York Times | 30 August 2014

Security experts say the only hope of protecting corporate networks from hackers is something the industry calls “defense in depth.” The phrase simply means that plugging in one traditional defense — antivirus software, or a firewall, is no longer going to cut it. More

Why Breach Detection Is Your New Must-Have, Cyber Security Tool
Tech Crunch | 6 September 2014

It's time for CIOs to start focusing on the next line of defense in the war against cyber crime: an emerging area called breach detection, which focuses on identifying long-tail intrusions after they happen and mitigating their damage, partly through the use of big-data technologies. Your company’s information security may depend on it. More

INTERVIEW: Vectra Networks to use Series C to grow real-time cyber threat detection
Global Security Finance | 27 August 2014

Vectra Networks, Inc. announced on August 5 it had raised a new $25 million round of funding to boost sales and marketing for its behavior-based cyber security solution. More

Cyber Attacks: We're Fighting an Asymmetric War
Computer Technology Review | 26 August 2014

Cybercriminals' ability to attack is outpacing our ability to defend. We are fighting an asymmetric war. Resources are one challenge, but so are the defensive tactics. Organizations rely on security best practices and products that were developed to counter a different threat—long before the rise of mobility, the cloud and well-organized criminals. More

Taking Stock
BloombergTV | 19 August 2014

Vectra Networks CEO Hitesh Sheth and CrowdStrike CEO George Kurtz comment on the Chinese hackers that stole personal information from 4.5 million patients of Community Health Systems and discuss how vulnerable U.S. companies are to hackers. They speak with Pimm Fox on "Taking Stock." (video) More

Taking Stock
BloombergTV | 05 August 2014

Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy. (video) More

Vectra Networks Raises $25M to Stop Cyberattacks in Progress
Wall Street Journal | 05 August 2014

Cybersecurity vendors are being forced to recognize that fact, and one of them, Vectra Networks Inc., has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first. More

Vectra Networks detects cyber attacks in real-time, raises $25M
VentureBeat | 05 August 2014

Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials. More

Vectra Networks raises $25M to fend off cyberattacks in real time
Silicon Valley Business Journal | 05 August 2014

Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital. More

Vectra Networks Raises $25M to Empower Enterprises in Their Battle Against Cyber Attacks
Vectra Press Release | 05 August 2014

Accel Partners leads Series C funding with Eric Wolford joining the Vectra board; Latest financing further validates Vectra’s unique approach of detecting and prioritizing cyber attacks in real time. More

BYOD Programs Leave Several Security Holes Open
eWeek | 25 July 2014

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey. More

3 steps to a more secure BYOD program
FierceCIO | 25 July 2014

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds. More

Survey Roundup: Culture Change Top Compliance Goal
Wall Street Journal | 25 July 2014

Ben DiPietro of the WSJ looks at some recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn. More

Are IT groups really ready for BYOD security challenges?
NetworkWorld | 24 July 2014

LinkedIn survey finds enterprise mobility still in infancy. More

More Exploits Expected to Enter Organizations via Mobile Devices
Mobile Marketing Watch | 24 July 2014

The Second Annual BYOD & Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal. More

How organizations deal with BYOD and mobile security
Help Net Security | 24 July 2014

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations. More

InfoSec pros worried BYOD ushers in security exploits, survey says
SC Magazine | 23 July 2014

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace. More

Firms turn blind-eye to BYOD policy
FierceMobileIT | 23 July 2014

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection. More

Vectra Networks: 79% of Orgs. Lack BYOD Policies
MSPmentor | 23 July 2014

New study shows malware protection is a requirement for mobile security. More

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices is a Top BYOD Security Concern in 2014
Vectra Press Release | 23 July 2014

Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More

Vectra Networks Recognized by CRN as a 2014 Emerging Vendor
Vectra Press Release | 21 July 2014

Vectra Networks has been named one of this year's hottest tech startups impacting the IT channel and technology industry. More

Defense in Depth for Advanced Threat Protection
Infosec Island | 9 July 2014

Defense in Depth is practical strategy and "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. More

View All News & Media

Upcoming Events

IT Roadmap, San Jose

17 September 2014 – San Jose Convention Center, San Jose, CA

Join us in the heart of the Silicon Valley for IT Roadmap and experience a full day of unbiased perspectives from analysts, industry leaders and practitioners, integrated
learning in workshops, keynotes and breakout sessions, and networking opportunities
with regional IT peers. Register today.

Tech in Motion, Silicon Valley

18 September 2014, 6PM-9PM – Microsoft Campus, Bldg 1, 1065 La Avenida St, Mountain View, CA

Join Vectra and other companies who are developing ways to ensure security for personal information, businesses, homes, and personal safety in a evening of Tech Talk presentations focus. Register today.