Vectra is the world leader in applying AI to detect and respond to cyberattacks in real time

The Cognito platform from Vectra provides continuous, automated threat hunting and response to proactively expose hidden cyberattackers in private data centers, public clouds, user and IoT devices, and encrypted traffic.

Vectra is on the DHS CDM approved products list

66 federal civilian agencies as well as state and local governments can now purchase Vectra cybersecurity products

The importance of speed in detecting cyberattackers

Detect threats faster  Federal version

Former deputy secretary of DHS talks about cybersecurity

Hear from the former deputy secretary of the US Dept of Homeland Security

Vectra is the sole visionary in the Gartner Magic Quadrant for IDPS

Threat Research

The data science behind Cognito AI threat detection models

Cognito AI blends human expertise with a broad set of data science and machine learning techniques. It delivers a continuous cycle of intelligence based on threat research, global/local learning models, deep learning, and neural networks.

Compliance Solutions

How Cognito addresses key elements of the NIST framework

This compliance brief highlights key components of the NIST cybersecurity framework and explains in detail how the Cognito platform addresses these key components. Vectra provides operators of critical infrastructure with real-time automated threat hunting and incident response across the entire enterprise.

How Cognito meets CIS Critical Security Controls 6.0

Critical Security Controls developed through federal and community efforts, coordinated by the SANS Institute, and maintained by the Center for Internet Security can mitigate modern attack profiles. “By adopting basic cyber hygiene, enterprises can reduce their cyberrisk profile,” says Jane Holl Lute, board member and former CEO at CIS.

How Cognito supports DFARS and the NIST framework

Embracing key parts of the NIST framework in support of the Defense Federal Acquisition Regulation Supplement, the Cognito cybersecurity platform provides DoD contractors and subcontractors with continuous, automated threat detection and response across enterprise networks – from cloud and data center workloads to user and IoT devices.



Vectra is FIPS 140-2 validated
FIPS-Approved Algorithms:
- AES (Cert. ##2273)
- HMAC (Cert. ##1391)
- DSA (Cert. ##709); ECDSA (Cert. ##368)
- RSA (Cert. ##1166)
- SHS (Cert. ##1954)
- Triple-DES (Cert. ##1420)
- DRBG (Cert. ##281)
- CVL (Cert. ##44)
- RNG (Cert ##1132)

Other Algorithms:
- RSA (key wrapping)
- Key establishment methodology provides between 112 and 256 bits of encryption strength
- Non-compliant less than 112 bits of encryption strength
- EC Diffie-Hellman key agreement
- Key establishment methodology provides between 112 and 256 bits of encryption strength
- Non-compliant less than 112 bits of encryption strength

Vectra is available via GSA and SEWP contract vehicles. Please contact Federal Sales for more information

White Papers

2018 Black Hat Edition of the Attacker Behavior Industry Report

Cyberattack detections and trends from more than 250 Vectra customers in 14 industries and over 4 million devices and workloads. The report also shows an increase in attacks against manufacturing organizations.

How Cognito from Vectra is ideal for replacing IDS

IDS relies on signatures to stop known threats from getting into networks. But they are blind to unknown threats. Cyberattackers know this and can change a few bits of code in known malware to create an unknown threat.

The power to Detect and Recall

Cognito Detect: AI-powered cyberattack detection

Provides real-time, automated cyberattack detection – from cloud and data center workloads to user and IoT device. Puts attack details at your fingertips, empowering quick, decisive action to stop attackers before they do damage.

Cognito Recall: AI-assisted threat hunting and investigations

Delivers high-fidelity visibility across the enterprise by collecting and storing enriched network metadata, relevant logs and cloud events in real-time. Access to historical metadata enables more conclusive incident investigations.

Analyst reports

  • insert_drive_file

    Gartner names Vectra the sole visionary in IDPS

    Vectra is the only "Visionary" in the Gartner IDPS Magic Quadrant. Learn how advanced analytics and machine learning are used to detect cyberattackers inside networks.


  • insert_drive_file

    EMA Radar Summary for network security analytics

    Vectra stands out in this product evaluation by identifying connections between a range of events, hosts and detection methods to automatically surface coordinated attacks.


Meet the Vectra leadership team