Resources

Product overviews

Product overview

Cognito Detect overview

Product overview

Cognito Recall overview

White papers

White paper

How Cognito secures cloud data centers from cyberattacks

White paper

How to improve ROI and operational efficiency for cybersecurity

White paper

How to augment security operations centers with AI

White paper

How Cognito is ideal for replacing IDS

ENG | FR

White paper

The data science behind Cognito AI threat detection models

ENG | GER | FR

White paper

Surviving the ransomware pandemic

White paper

How to detect malicious covert communications

Compliance solutions

Compliance solution

Compliance with the N.Y. State Department of Financial Services Cybersecurity Regulation

Compliance solution

How Cognito enables compliance with the General Data Protection Regulation (GDPR)

ENG | GER | FR

Compliance solution

How Cognito from Vectra helps meet FFIEC cybersecurity requirements

Compliance solution

How Cognito addresses key elements of the NIST framework

Compliance solution

How Cognito supports DFARS and the NIST framework

Compliance solution

How Cognito enables the implementation of an adaptive security architecture

Compliance solution

How Cognito meets CIS Critical Security Controls 6.0

Compliance solution

How Cognito meets PCI DSS 3.2 requirements

Industry solutions

Industry solution

How financial institutions can stop cyberattacks in their tracks

Industry solution

Protecting patient health and privacy from cybercriminals

Industry solution

How pharmaceutical companies can protect valuable IP

Industry solution

How medical device manufacturers can safeguard vital IP

Industry solution

Protecting higher education networks from cyberthreats

Integrations

Integration

Cognito enhances data center protection through VMware

Integration

Faster network and endpoint detection and response with Cognito and CrowdStrike

Integration

Detect and mitigate cyberattacks with Cognito and Carbon Black

Integration

Integrating Cognito with Micro Focus ArcSight

Integration

Integrating Cognito with IBM QRadar

Integration

Integrating Cognito with Splunk

Integration

Vectra Active Enforcement for the Demisto security automation and orchestration platform

Integration

Vectra Active Enforcement for the Phantom security automation and orchestration platform

Integration

Juniper and Cognito create a new class of advanced persistent threat defense

Integration

Gigamon provides intelligent traffic filtering for Cognito

Integration

Ixia provides complete network access for Cognito

Platform specifications

Platform specifications

Cognito platform specifications

ENG | GER | FR

Case studies

Research

Research

Ovum On-the-Radar Report: Vectra adds investigation and threat hunting with Cognito Recall

Research

2018 Spotlight Report: Could an Equifax-sized data breach happen again?

Research

Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems

Research

2018 RSA Conference Edition of the Attacker Behavior Industry Report

ENG | GER | FR

Research

451 Research: Vectra debuts total Cognito Recall

Research

451 Research: Network traffic analytics can augment security operations expertise

Research

ESG Lab Review: Vectra Cognito automates security operations with AI

Research

How to interpret network-based malware detection

Videos

On-demand webcasts

On-demand webcast

Humans + AI = security that thinks and recalls

REGISTER TO WATCH IT NOW

On-demand webcast

AI and machine learning in cybersecurity

REGISTER TO WATCH IT NOW

On-demand webcast

How to integrate Vectra with Phantom

REGISTER TO WATCH IT NOW

On-demand webcast

Ticketmaster automates threat hunting

REGISTER TO WATCH IT NOW

On-demand webcast

Ransomware pandemic special

REGISTER TODAY

On-demand webcast

Why data center attackers are aiming low

REGISTER TODAY

Demos

e-Books

e-Book

What can you do with the Cognito platform?

e-Book

Cryptocurrency mining infographic and e-book

e-Book

Six critical attack vectors to detect in your data center and private cloud

e-Book

Minding the cybersecurity gap

e-Book

A new threat detection model that closes the cybersecurity gap

e-Book

How cyberattackers evade threat signatures

Company backgrounder

Company backgrounder

Everything you need to know about Vectra