Tribune Media Group

Tribune Media relies on Vectra to fortify its cyber security infrastructure

To boost its cyber security efforts, Tribune Media Group relies on the Vectra automated threat management solution to protect its broadcast and digital media facilities from targeted attacks.

With Vectra, Tribune Media instantly identifies attack behaviors and infected hosts inside the network. In real time, Vectra prioritizes attacks that pose the highest risk so the Tribune Media cyber security team can promptly mitigate a threat and prevent data loss.

Threat detection on steroids

"Vectra is threat detection on steroids," said Duane Smith, Tribune Media chief information security officer. "It does all the work for me. If there’s a cyber security threat, Vectra quickly digs deeper and shows me the root cause."

Taking the guesswork out of cyber security

Tribune Media deployed Vectra X-series platform at its Chicago data center for visibility into internal and Internet-bound network traffic. It also deployed Vectra S-series sensors to detect cyber security threats at 42 remote broadcast facilities.

"Every security organization’s biggest challenge is knowing what you don’t know," Smith noted. "Vectra takes the guesswork out of detecting credible threats, and I saw immediately value in that."




Detect cyber security breaches at Tribune Media's headquarters and broadcast stations

Selection criteria

Real-time visibility into network breaches


  • Identified unexpected and unknown security threats
  • Gained single view of threats across the enterprise network, including remote sites
  • Prevented wasting time uncovering false positives

Related Resources

How Cognito is ideal for replacing IDS

IDS relies on signatures to stop known threats from getting into networks. But they are blind to unknown threats. Cyberattackers know this and can change a few bits of code in known malware to create an unknown threat.

Download the French Version

How to improve ROI and operational efficiency for cybersecurity

IT security is an ongoing exercise in ROI and operational efficiency. Organizations have a limited set of resources to address an unlimited set of risks, threats and attackers. This asymmetry means that security products must always be evaluated in terms of efficacy as well as their impact on the operational fitness of the organization.