Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vectra Teams with Carbon Black on AI-Powered Threat Response

Unified solution delivers security-analyst-in-software capabilities to fill enterprise cybersecurity roles in the midst of a global shortage of skilled professionals.

SAN JOSE, Calif. – (Marketwired – Feb. 2, 2017) – Vectra Networks, the leader in artificial intelligence software that automates the hunt for in-progress cyber attacks, today announced the groundbreaking unification of network-based cyber attack detection with Carbon Black’s Cb Response to detect and isolate active threats in enterprise networks with unprecedented speed and precision.

In explaining the importance of finding and stopping cyber attacks quickly, Adm. Michael S. Rogers, director of the U.S. National Security Agency, recently told the Senate Armed Services Committee that “the biggest frustration to me is speed, speed, speed. We have got to get faster.”

It is estimated that today there are over 1 million unfilled cybersecurity jobs – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the United States. “This global skills shortage strikes at the very heart of our ability to promptly find and stop cyber attacks,” said Vectra CSO Günter Ollmann.

“Together, Vectra and Carbon Black help to solve today’s toughest cybersecurity challenges by correlating endpoint and network data and dramatically reducing the time it takes to find and stop cyber attacks,” said Tom Barsi, senior vice president of business development for Carbon Black.

“To address these critical issues, Vectra artificial intelligence software performs non-stop automated threat hunting to deliver real-time attack visibility,” said Vectra CTO Oliver Tavakoli. “This exposes hidden and unknown cyber attack behaviors that frequently go undetected in enterprise networks.”

Vectra integrates with the complete endpoint visibility provided by Carbon Black to automatically prioritize the highest-risk threats. Infosec teams can then use Cb Response to investigate attacks and quickly respond and remediate with the most relevant context in hand.

To learn more about the Vectra and Carbon Black integrated detection and response solution, download the solution brief.

You may also visit Carbon Black at booths S1532 and S1345 at the RSA Conference in San Francisco, Feb. 13-16, or schedule an onsite meeting with Vectra executives at RSA.

About Vectra Networks

Vectra® Networks is the leader in automating the hunt for in-progress cyber attacks. Using artificial intelligence, Vectra correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2016, Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.

# # #

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

CONTACT INFORMATION

Mike Banic

Vice President of Marketing

Vectra Networks

Email: [email protected]

Phone: 408-326-2026

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14540
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
CVE-2019-16332
PUBLISHED: 2019-09-15
In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
CVE-2019-16333
PUBLISHED: 2019-09-15
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
CVE-2019-16334
PUBLISHED: 2019-09-15
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
CVE-2019-16335
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.