$25M raised in the battle against cyber attacks

Read the News

Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

See How it Works

BYOD ushers in security exploits

Detecting malware on BYOD and mobile devices is a requirement for 60% of organizations according to the second annual report on BYOD and Mobility Security from the Information Security Community on LinkedIn. 

Get the Report

Cyber security hygiene to prevent malware threats

The CEO of the Council on Cyber Secuity, Jane Lute, discusses the ever-changing malware threat landscape and Vectra’s ability to continuously scan, diagnose and provide opportunities to mitigate loss during the lifecycle of a malware threat. 

Watch Video

Detect unknown malware threats

Don’t let fear of the unknown keep you up at night. Sam Kamran of Riverbed Technology explains how Vectra protects against never-seen-before malware threats and provides intuitive, actionable reports throughout the attack lifecycle. 

Watch Video



Up and running in minutes. Vectra learns everything it needs to know.


Continuous malware threat monitoring instantly identifies any phase of an attack.


The Threat Certainty Index™ ensures you address the highest malware threat first.


Learns new malware threat behaviors and adapts to your ever-changing network.


Art of Scoring Malware Detections – Friend or Foe?
15 August 2014

Vectra CTO Oliver Tavakoli explores the variety of opinions about what constitutes a threat to the network and how Vectra is striving to supply the right epiphanies for customers with little to no configuration. More

View More Blog Posts

News & Media

Taking Stock
BloombergTV | 05 August 2014

Bloomberg TV host Pimm Fox speaks with Vectra CEO Hitesh Sheth on how Vectra works, its contextual reporting and protecting organizations while maintaining privacy. (video) More

Vectra Networks Raises $25M to Stop Cyberattacks in Progress
Wall Street Journal | 05 August 2014

Cybersecurity vendors are being forced to recognize that fact, and one of them, Vectra Networks Inc., has raised another $25 million in funding to detect and prioritize attacks in real time so customers can decide which ones to fight first. More

Vectra Networks detects cyber attacks in real-time, raises $25M
VentureBeat | 05 August 2014

Accel Partners and existing investors just dropped a new $25 million into Vectra Networks, a security startup deeply connected to U.S. national security officials. More

Vectra Networks raises $25M to fend off cyberattacks in real time
Silicon Valley Business Journal | 05 August 2014

Vectra Networks Inc., a San Jose startup whose software aims to protect corporate and government IT systems against cyberattacks, has raised $25 million in capital provided by Accel Partners, Khosla Ventures and Intel Capital. More

Vectra Networks Raises $25M to Empower Enterprises in Their Battle Against Cyber Attacks
Vectra Press Release | 05 August 2014

Accel Partners leads Series C funding with Eric Wolford joining the Vectra board; Latest financing further validates Vectra’s unique approach of detecting and prioritizing cyber attacks in real time. More

BYOD Programs Leave Several Security Holes Open
eWeek | 25 July 2014

Just 21 percent of more than 1,100 IT security practitioners said their organizations have fully implemented BYOD policies, processes and infrastructure, according to recent survey. More

3 steps to a more secure BYOD program
FierceCIO | 25 July 2014

Despite all the warnings in the tech media about Bring-Your-Own-Device, or BYOD, security risks, a minority of organizations have implemented policies or processes to address BYOD, a new study finds. More

Survey Roundup: Culture Change Top Compliance Goal
Wall Street Journal | 25 July 2014

Ben DiPietro of the WSJ looks at some recent surveys and reports dealing with risk and compliance issues, including the new BYOD and Mobility Report from Vectra and the Information Security Group on LinkedIn. More

Are IT groups really ready for BYOD security challenges?
NetworkWorld | 24 July 2014

LinkedIn survey finds enterprise mobility still in infancy. More

More Exploits Expected to Enter Organizations via Mobile Devices
Mobile Marketing Watch | 24 July 2014

The Second Annual BYOD & Mobile Security Study reveals more exploits entering organizations via mobile devices. All told, this reality a now a top BYOD security concern, experts reveal. More

How organizations deal with BYOD and mobile security
Help Net Security | 24 July 2014

Report shows that 21 percent of organizations who acknowledge broad use of privately owned devices do not support those devices within their organizations. More

InfoSec pros worried BYOD ushers in security exploits, survey says
SC Magazine | 23 July 2014

Despite the significant damage, including loss of company or client data and unauthorized access to data and systems that the use of privately owned devices without proper security can wreak, most organizations simply have not kept pace with the explosion in use of those personal devices in the workplace. More

Firms turn blind-eye to BYOD policy
FierceMobileIT | 23 July 2014

Close to one-fourth of organizations that have broad use of BYOD devices do not support their use, opening up the enterprise to security risks such as malware infection. More

Vectra Networks: 79% of Orgs. Lack BYOD Policies
MSPmentor | 23 July 2014

New study shows malware protection is a requirement for mobile security. More

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices is a Top BYOD Security Concern in 2014
Vectra Press Release | 23 July 2014

Independent research study conducted by LinkedIn Information Security Community finds more than half of 1,100 respondents identify malware protection as a key requirement for mobile security. More

Vectra Networks Recognized by CRN as a 2014 Emerging Vendor
Vectra Press Release | 21 July 2014

Vectra Networks has been named one of this year's hottest tech startups impacting the IT channel and technology industry. More

Defense in Depth for Advanced Threat Protection
Infosec Island | 9 July 2014

Defense in Depth is practical strategy and "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. More

10 Security Start-ups to Watch
Network World | 30 June 2014

Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. More

Jim Messina Joins Vectra Networks Board of Directors
Vectra Press Release | 17 June 2014

Jim Messina, the founder and CEO of the Messina Group, a consulting firm with offices in Washington, D.C. and San Francisco, has joined Vectra's Board of Directors. More

Stop Allowing Your Security Strategy to Drain IT Resources
Computer Technology Review | 11 June 2014

Most organizations would say protecting high-value information and complying with regulations is a priority, but in practice, few businesses have enough IT security staff and resources to ensure that policies are defined and upheld, systems are secured, and users are trained. More

Information overload: Finding signals in the noise
CSO | 29 May 2014

As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored. More

Charles Giancarlo Joins Vectra Networks Board of Directors
Vectra Press Release | 28 May 2014

Charles Giancarlo, a Senior Advisor to Silver Lake Partners and previous Managing Director and Head of Value Creation, joins Vectra's Board of Directors. More

View All News & Media

Upcoming Events

IT Roadmap, San Jose

17 September 2014 – San Jose Convention Center, San Jose, CA

Join us in the heart of the Silicon Valley for IT Roadmap and experience a full day of unbiased perspectives from analysts, industry leaders and practitioners, integrated
learning in workshops, keynotes and breakout sessions, and networking opportunities
with regional IT peers. Register today.

Cornerstones of Trust 2014

01 October 2014 – Crowne Plaza Hotel, Foster City, CA

The Cornerstones of Trust conference helps security leaders and security practitioners evaluate trends and develop responses to the challenges like increasing cost pressures, rising compliance complexity, changing threat landscape and emerging technology disruptors. Register today.