Threat Intelligence
2/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vectra Teams with Carbon Black on AI-Powered Threat Response

Unified solution delivers security-analyst-in-software capabilities to fill enterprise cybersecurity roles in the midst of a global shortage of skilled professionals.

SAN JOSE, Calif. – (Marketwired – Feb. 2, 2017) – Vectra Networks, the leader in artificial intelligence software that automates the hunt for in-progress cyber attacks, today announced the groundbreaking unification of network-based cyber attack detection with Carbon Black’s Cb Response to detect and isolate active threats in enterprise networks with unprecedented speed and precision.

In explaining the importance of finding and stopping cyber attacks quickly, Adm. Michael S. Rogers, director of the U.S. National Security Agency, recently told the Senate Armed Services Committee that “the biggest frustration to me is speed, speed, speed. We have got to get faster.”

It is estimated that today there are over 1 million unfilled cybersecurity jobs – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the United States. “This global skills shortage strikes at the very heart of our ability to promptly find and stop cyber attacks,” said Vectra CSO Günter Ollmann.

“Together, Vectra and Carbon Black help to solve today’s toughest cybersecurity challenges by correlating endpoint and network data and dramatically reducing the time it takes to find and stop cyber attacks,” said Tom Barsi, senior vice president of business development for Carbon Black.

“To address these critical issues, Vectra artificial intelligence software performs non-stop automated threat hunting to deliver real-time attack visibility,” said Vectra CTO Oliver Tavakoli. “This exposes hidden and unknown cyber attack behaviors that frequently go undetected in enterprise networks.”

Vectra integrates with the complete endpoint visibility provided by Carbon Black to automatically prioritize the highest-risk threats. Infosec teams can then use Cb Response to investigate attacks and quickly respond and remediate with the most relevant context in hand.

To learn more about the Vectra and Carbon Black integrated detection and response solution, download the solution brief.

You may also visit Carbon Black at booths S1532 and S1345 at the RSA Conference in San Francisco, Feb. 13-16, or schedule an onsite meeting with Vectra executives at RSA.

About Vectra Networks

Vectra® Networks is the leader in automating the hunt for in-progress cyber attacks. Using artificial intelligence, Vectra correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2016, Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.

# # #

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

CONTACT INFORMATION

Mike Banic

Vice President of Marketing

Vectra Networks

Email: [email protected]

Phone: 408-326-2026

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I've seen worse.  Last week Tim had a dragon."
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.