Vectra has become an essential part of the Hydro Ottawa security operations team
Vectra augments the work of security analysts at Hydro Ottawa using AI
“The reality is cyber attacks are going to happen,” said Jojo Maalouf, IT security manager at Hydro Ottawa. “That means you have to be able to detect and remediate threats as quickly as possible. We were using a log aggregator that required a lot of manual threat hunting.”
“That’s why we turned to Vectra,” Maalouf explained.
Automating threat management
By detecting threats in real time on the corporate network with Vectra, Hydro Ottawa can prevent targeted attacks from spreading to the operational network and eliminate disruptions to the distribution of power throughout the region.
More effective security operations
The Vectra Threat Certainty Index™ plays a significant role in boosting efficiency. It automatically consolidates thousands of threat events and historical context to pinpoint infected hosts that pose the greatest risk with the highest degree of certainty.
Adding immediate value
The time-to-value with Vectra was swift at Hydro Ottawa. While proof-of-concept tests for security are legendarily time-intensive, Maalouf described the Vectra product evaluation as “very easy.”
Close the gap between infection and detection
Automate threat management that is simple to use and integrates easily with other security tools
- Faster threat detection and response
- Eliminates manual threat hunting and speeds-up threat investigations
- Highest-risk threats are automatically scored and prioritized so security teams can quickly stop attackers before damage is done
- Advanced cybersecurity protection based on the NIST framework
Insider threat cases make up 28% of all cybercrime and more than a third of organizations reported an insider cyberattack in 2013, and 32% of affected organizations said that the damage caused by insider cyberattacks was greater than outsider attacks.
IT security is an ongoing exercise in ROI and operational efficiency. Organizations have a limited set of resources to address an unlimited set of risks, threats and attackers. This asymmetry means that security products must always be evaluated in terms of efficacy as well as their impact on the operational fitness of the organization.