Vectra® Networks, the leader in real-time detection of in-progress cyber-attacks, today announced an unprecedented technology breakthrough that enables the detection of covert cyber attack communications in encrypted tunnels without using decryption. Also a first in the industry, the company also announced that it is now possible to detect hidden attack behaviors that hide in everyday applications that flow across today’s enterprise networks.
According to Mike Rothman, analyst and president of research firm Securosis, “It’s clear that threat detection needs to evolve to more effectively catch modern adversaries. But detecting attacks from network traffic can be challenging. Attackers work diligently to ‘hide in plain sight’ by obscuring their attack traffic within the tens of billions of legitimate packets on the network.”1
Attackers use covert attack communications like an invisibility cloak to hide in ordinary network traffic while they take their time to orchestrate the theft of an organization’s data and assets. Vectra applies advanced data science and machine learning algorithms directly to network traffic to reveal hidden underlying behaviors without needing decryption. This visibility robs attackers of the stealth and coordination that has made modern attacks so successful.
Attackers use a variety of covert attack communication methods, including encryption, hiding within ordinary applications, and skulking in common communications protocols. Vectra takes a revolutionary approach to detecting malicious covert communications in:
“Until now, organizations had no way to protect themselves from attackers who use covert communications to steal their data with impunity,” said Oliver Tavakoli, chief technology officer at Vectra Networks. “Vectra reveals attackers’ hidden communications and sheds light into all phases of a cyber attack, giving organizations an effective way to fight back and protect their valuable information assets.”
To learn how Vectra actually detects hidden attack communications inside networks, register to download the white paper, "How to detect malicious covert communications."
Vectra® Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat-management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. In 2015, Gartner named Vectra a Cool Vendor in Security Intelligence for addressing the challenges of post-breach threat detection. The American Business Awards also selected Vectra as the Gold Award winner for Tech Startup of 2015. Vectra’s investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif., and it has European operations in Zurich. More information can be found at www.vectranetworks.com.
1. “Network-Based Threat Detection,” Version 1.5, Securosis, June 19, 2015.?
###
Vectra and the Vectra Networks logo are registered trademarks and Security that thinks, the Vectra Threat Labs, and the Threat Certainty Index are trademarks of Vectra Networks. Other brand, product and service names are trademarks, registered trademarks or service marks of their respective holders.