Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Vectra Expands Cloud Services to See Attacks Moving Between the Cloud, Hybrid and on-Premise to Drastically Reduce the Risk of Breaches

Vectra is first to use cloud identities to track and link interactions between hosts and accounts across the entire network

Vectra, a leader in network threat detection and response (NDR), announced broader and deeper cloud capabilities to track and link accounts and data in hybrid environments. Current security approaches lose visibility when environments expand to the cloud where users leverage multiple different accounts and may access resources from shadow IT devices. Historically users and hosts were on-premises and tightly controlled. Vectra’s enhanced capabilities mark the first, and only, NDR solution that can detect and stop threats across the entire network, tying together attacker activities and progression between cloud, hybrid, and on-premise networks.

The increasing number of remote workers, combined with the number of IoT devices accessing corporate and cloud networks, make both traditional network security solutions, including intrusion detection and endpoint protection, blind to activity and data in cloud applications. The rise of targeted credential-based attacks negate email security, multifactor authentication (MFA), cloud access security brokers (CASBs), and other threat-prevention approaches normally established to protect users because these malicious account-based attacks look like legitimate user actions.

Recommended AI News: Blue Prism Automation Lifecycle Suite Simplifies Intelligent Automation in the Enterprise

“Private and trusted networks cannot be protected by old network security focused on malware signatures and anomaly detection alone. As workload shifts from clients, servers, and endpoints to the public cloud, this proliferation has created a network where user identity has become the new perimeter,” said Oliver Tavakoli, Chief Technology Officer at Vectra. “Vectra is uniquely positioned to protect this network of hybrid on-premise and cloud connectivity with our learning behavioral models that stitch together hosts and on-premise and cloud identities to stop attacks earlier in the kill chain.”

Related Posts
1 of 40,714

Vectra empowers security teams with continued analysis of how users are accessing, using and configuring cloud services based on logs from SaaS, and account usage from Identity Providers (IdPs) like Microsoft Azure AD. Vectra is the only solution that ties together all host and account interactions as they move betweencloud and on-premise environments in one consolidated view, to drastically reduce the overall risk of a breach.

Recommended AI News: Teradata Launches New ‘DataDNA’ Data Forensics Tool

This announcement comes on the heels of Vectra’s release of Cognito Detect for Office 365 earlier this year, the rapid adoption of which led to an accelerated effort to deepen and enhance this service. By seamlessly integrating with SaaS applications like Office 365, IaaS providers, IdPs and cloud virtualization platforms, Vectrais giving visibility into who and what is accessing data, regardless of how and where.

Even before the rise of the COVID-19, the Microsoft Q1 FY20 earnings call reported more than 200 million monthly Office 365 users. As of June, Teams reported 115 million daily active users, exceeding Zoom. The sheer growth of individuals using the service increases the chance that cyber hygiene will fall by the wayside, and knowledgeable attackers will exploit human behavior to gain high-privilege access to critical business-data.

Recommended AI News: Viasat, Infostellar Sign Global Real-Time Earth Agreement

1 Comment
  1. Electric motor copper scrap says

    Copper smelting process Copper scrap forging Scrap metal reclamation industry
    Copper cable scrap export requirements, Metal waste reclaiming facility, Copper scrap purchasing

Leave A Reply

Your email address will not be published.