Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vectra Teams with Carbon Black on AI-Powered Threat Response

Unified solution delivers security-analyst-in-software capabilities to fill enterprise cybersecurity roles in the midst of a global shortage of skilled professionals.

SAN JOSE, Calif. – (Marketwired – Feb. 2, 2017) – Vectra Networks, the leader in artificial intelligence software that automates the hunt for in-progress cyber attacks, today announced the groundbreaking unification of network-based cyber attack detection with Carbon Black’s Cb Response to detect and isolate active threats in enterprise networks with unprecedented speed and precision.

In explaining the importance of finding and stopping cyber attacks quickly, Adm. Michael S. Rogers, director of the U.S. National Security Agency, recently told the Senate Armed Services Committee that “the biggest frustration to me is speed, speed, speed. We have got to get faster.”

It is estimated that today there are over 1 million unfilled cybersecurity jobs – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the United States. “This global skills shortage strikes at the very heart of our ability to promptly find and stop cyber attacks,” said Vectra CSO Günter Ollmann.

“Together, Vectra and Carbon Black help to solve today’s toughest cybersecurity challenges by correlating endpoint and network data and dramatically reducing the time it takes to find and stop cyber attacks,” said Tom Barsi, senior vice president of business development for Carbon Black.

“To address these critical issues, Vectra artificial intelligence software performs non-stop automated threat hunting to deliver real-time attack visibility,” said Vectra CTO Oliver Tavakoli. “This exposes hidden and unknown cyber attack behaviors that frequently go undetected in enterprise networks.”

Vectra integrates with the complete endpoint visibility provided by Carbon Black to automatically prioritize the highest-risk threats. Infosec teams can then use Cb Response to investigate attacks and quickly respond and remediate with the most relevant context in hand.

To learn more about the Vectra and Carbon Black integrated detection and response solution, download the solution brief.

You may also visit Carbon Black at booths S1532 and S1345 at the RSA Conference in San Francisco, Feb. 13-16, or schedule an onsite meeting with Vectra executives at RSA.

About Vectra Networks

Vectra® Networks is the leader in automating the hunt for in-progress cyber attacks. Using artificial intelligence, Vectra correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2016, Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.

# # #

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

CONTACT INFORMATION

Mike Banic

Vice President of Marketing

Vectra Networks

Email: [email protected]

Phone: 408-326-2026

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .