Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vectra Teams with Carbon Black on AI-Powered Threat Response

Unified solution delivers security-analyst-in-software capabilities to fill enterprise cybersecurity roles in the midst of a global shortage of skilled professionals.

SAN JOSE, Calif. – (Marketwired – Feb. 2, 2017) – Vectra Networks, the leader in artificial intelligence software that automates the hunt for in-progress cyber attacks, today announced the groundbreaking unification of network-based cyber attack detection with Carbon Black’s Cb Response to detect and isolate active threats in enterprise networks with unprecedented speed and precision.

In explaining the importance of finding and stopping cyber attacks quickly, Adm. Michael S. Rogers, director of the U.S. National Security Agency, recently told the Senate Armed Services Committee that “the biggest frustration to me is speed, speed, speed. We have got to get faster.”

It is estimated that today there are over 1 million unfilled cybersecurity jobs – growing to over 1.5 million by 2019 – and more than 200,000 of those vacancies are in the United States. “This global skills shortage strikes at the very heart of our ability to promptly find and stop cyber attacks,” said Vectra CSO Günter Ollmann.

“Together, Vectra and Carbon Black help to solve today’s toughest cybersecurity challenges by correlating endpoint and network data and dramatically reducing the time it takes to find and stop cyber attacks,” said Tom Barsi, senior vice president of business development for Carbon Black.

“To address these critical issues, Vectra artificial intelligence software performs non-stop automated threat hunting to deliver real-time attack visibility,” said Vectra CTO Oliver Tavakoli. “This exposes hidden and unknown cyber attack behaviors that frequently go undetected in enterprise networks.”

Vectra integrates with the complete endpoint visibility provided by Carbon Black to automatically prioritize the highest-risk threats. Infosec teams can then use Cb Response to investigate attacks and quickly respond and remediate with the most relevant context in hand.

To learn more about the Vectra and Carbon Black integrated detection and response solution, download the solution brief.

You may also visit Carbon Black at booths S1532 and S1345 at the RSA Conference in San Francisco, Feb. 13-16, or schedule an onsite meeting with Vectra executives at RSA.

About Vectra Networks

Vectra® Networks is the leader in automating the hunt for in-progress cyber attacks. Using artificial intelligence, Vectra correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2016, Vectra was named “Most Innovative Emerging Company” in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures and DAG Ventures. The company is headquartered in San Jose, Calif. and has European regional headquarters in Zurich, Switzerland. More information can be found at www.vectranetworks.com.

# # #

Vectra, the Vectra Networks logo and Security that thinks are registered trademarks and the Vectra Threat Labs and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.

CONTACT INFORMATION

Mike Banic

Vice President of Marketing

Vectra Networks

Email: [email protected]

Phone: 408-326-2026

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.