Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vectra Teams with Carbon Black on AI-Powered Threat Response

Unified solution delivers security-analyst-in-software capabilities to fill enterprise cybersecurity roles in the midst of a global shortage of skilled professionals.

SAN JOSE, Calif. – (Marketwired – Feb. 2, 2017) – Vectra Networks, the leader in artificial intelligence software that automates the hunt for in-progress cyber attacks, today announced the groundbreaking unification of network-based cyber attack detection with Carbon Black’s Cb Response to detect and isolate active threats in enterprise networks with unprecedented speed and precision.

In explaining the importance of finding and stopping cyber attacks quickly, Adm. Michael S. Rogers, director of the U.S. National Security Agency, recently told the Senate Armed Services Committee that “the biggest frustration to me is speed, speed, speed. We have got to get faster.”

It is estimated that today there are over 1 million unfilled cybersecurity jobs – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the United States. “This global skills shortage strikes at the very heart of our ability to promptly find and stop cyber attacks,” said Vectra CSO Günter Ollmann.

“Together, Vectra and Carbon Black help to solve today’s toughest cybersecurity challenges by correlating endpoint and network data and dramatically reducing the time it takes to find and stop cyber attacks,” said Tom Barsi, senior vice president of business development for Carbon Black.

“To address these critical issues, Vectra artificial intelligence software performs non-stop automated threat hunting to deliver real-time attack visibility,” said Vectra CTO Oliver Tavakoli. “This exposes hidden and unknown cyber attack behaviors that frequently go undetected in enterprise networks.”

Vectra integrates with the complete endpoint visibility provided by Carbon Black to automatically prioritize the highest-risk threats. Infosec teams can then use Cb Response to investigate attacks and quickly respond and remediate with the most relevant context in hand.

To learn more about the Vectra and Carbon Black integrated detection and response solution, download the solution brief.

You may also visit Carbon Black at booths S1532 and S1345 at the RSA Conference in San Francisco, Feb. 13-16, or schedule an onsite meeting with Vectra executives at RSA.

About Vectra Networks

Vectra® Networks is the leader in automating the hunt for in-progress cyber attacks. Using artificial intelligence, Vectra correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2016, Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.

# # #

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

CONTACT INFORMATION

Mike Banic

Vice President of Marketing

Vectra Networks

Email: [email protected]

Phone: 408-326-2026

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19924
PUBLISHED: 2021-05-18
In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.
CVE-2020-20220
PUBLISHED: 2021-05-18
Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20227
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
CVE-2020-20245
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the log process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20246
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the mactel process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.