Media coverage

  • Forbes hottest cybersecurity startups of 2015

    Forbes, 29 December 2015

    In 2015, there were few hotter areas in Silicon Valley than cybersecurity, and Vectra ranked in the top 10 of that competitive group.

  • Uncovering covert attack communications inside your network

    InfoSecurity, 24 December 2015

    Cyber attackers are slipping through perimeter defenses and hiding in the shadows and dark corners of networks.

  • Hello Kitty fixes website security flaw

    Cloud Pro, 23 December 2015

    Sanrio says the loophole that provided an attack entry method potentially allowing cyber criminals to bypass traditional security defences in order to enter and exploit internal systems with the appearance of a legitimate user, has been closed and data is now safe.

  • Algorithms are the key to detecting and mitigating cyber attacks

    Security News Desk, 23 December 2015

    Gerard Bauer, vice president of EMEA sales at Vectra, shares his security predictions for 2016.

  • Automated threat detection helps fulfill protection goals of critical security controls

    Homeland Security Today, 22 December 2015

    New technologies, such as machine learning, have evolved to help organizations improve their response to modern attacks. Although the financial industry has been using machine learning since the 1970s to detect fraudulent behavior, use of machine learning in the information security sector is a recent phenomenon.

  • Cybersecurity in virtual networks

    VMblog.com, 18 December 2015

    In this eighth annual VMblog.com series exclusive, virtualization and cloud executives share their predictions for 2016.

  • Protecting the university network and flagging attacks — in real time

    Education Dive, 15 December 2015

    Higher education is a key target for cyber attacks because of the open networks common on college and university campuses. Thousands of students and faculty wander on and off the network with their own devices, bringing viruses and malware to the wider community and creating nightmares for security teams.

  • SANS Institute shows true power of automated threat detection

    Cloud Security Resource, 14 December 2015

    A SANS Institute report, backed with findings from Vectra, explains how an automated threat detection system that combines behavioral analysis, data science and machine learning can help organizations meet Critical Security Control (CSC) mandates.

  • The state of cybersecurity: What 2016 will bring

    ITProPortal, 14 December 2015

    In 2016, what organisations need are tools that identify the activities of the attacker inside a network before a data breach occurs, with a focus on how to quickly intervene, minimise the time they are exposed and reduce the impact of cyberthreats.

  • How one university addresses targeted attacks in progress

    University Business, 14 December 2015

    Hernan Londono, associate CIO at Barry University in Miami, talks about embracing campus mobility and BYOD, and explains why a strong Advanced Persistent Threat (APT) defense is vital to protecting the university's network from mobile devices that it doesn't own or manage.

  • Data science, machine learning and behavioral analysis help identify new security threats

    Campus Technology, 8 December 2015

    Automated network threat detection tools that use data science, machine learning and behavioral analysis work with perimeter security to help organizations meet security goals defined in the CIS Critical Security Controls recommendations and protect against attackers, according to a new report from the SANS Institute.

  • Fleeting strategic importance? 2016, the year of the CISO

    IDG Connect, 7 December 2015

    The core view of most of the experts we spoke to was that, while it is not clear if there is a higher number of CISOs now, these individuals are definitely gaining a stronger position within the business.

  • Detecting and preventing cyberattacks in your network

    University Business, 7 December 2015

    Despite being vulnerable to cyberattacks, many universities still have insufficient threat management defenses. Attackers can easily evade perimeter security defenses and spy, spread and steal for the better part of a year, undetected. In the process, they'll take vital research data, personal info and financial records from campus community members.

  • Nothing's sacred: VTech hackers stole kids photos and chat histories

    SC Magazine, 1 December 2015

    VTech hackers purportedly made off with millions of pieces of customer information and have now been revealed to have stolen photos and private chat histories, too. VTech sold an app called Kid Connect that lets parents use their smartphones to talk to their kids through their VTech devices.

  • The exploitation game

    Computing Security, 30 November 2015

    What steps can be taken to detect and block exploits that take advantage of software vulnerabilities? And how can security teams better understand the behaviour of legitimate software components? Preventing the exploitation of software vulnerabilities is desirable but their detection is a must for organisations and their security teams.

  • Detecting and preventing cyberattacks in your network

    University Business, 30 November 2015

    Officials from Vectra Networks and Barry University in Miami discuss insufficient cyber attack defenses at many colleges, despite existing vulnerabilities. They also discuss new defense-in-depth models that quickly pinpoint and mitigate threats in progress and share security strategies that enable mobility as well as open and collaborative learning.

  • Why ransomware is not going away any time soon

    SecurityWeek, 30 November 2015

    Ransomware is targeting enterprise networks with a vengeance. In addition to user hard drives, it's been increasingly successful at encrypting file-shares and network drives. Consequently, ransomware has evolved from a mere nuisance to a potentially debilitating attack that holds critical business assets and intellectual property hostage.

  • VTech Holdings: Data from 5 million customer accounts breached

    Wall Street Journal, 30 November 2015

    VTech, maker of electronic toys for kids, said that 5 million of its customer accounts were leaked in a data breach that accessed user names, birthdays and passwords but not their credit card or personally identifiable information. Company officials noted that the breach was mounted by an "unauthorized party."

  • Vectra wins 2015 Computer Technology Review Most Valuable Product award

    Computer Technology Review, 24 November 2015

    Vectra advanced persistent threat (APT) security software was chosen by the Computer Technology Review editorial panel based on rigorous judging criteria that included product innovation, functionality and affordability.

  • No signatures required

    ITProPortal, 21 November 2015

    However, the most dangerous threat to data, user and system security is not the known known, but rather the unknown unknowns – the threats that have yet to be captured in the wild and mapped. We don’t know if they exist, we don’t have visibility into what they do, and there’s no way signatures can catch them.