Technology partner ecosystem

From cloud and data center workloads to user and IoT devices, today's enterprise security infrastructure is a vast and complicated collection of independent systems that are often blind to each other's actions.

Customers want to tear down the walls that separate these systems – such as SIEMs, endpoint security, firewalls, and orchestration – to improve workflows and define how the security infrastructure is collectively leveraged, controlled and automated.

Vectra and its technology partners make it happen. We help customers build well-coordinated security infrastructures that automatically map active attacks to infected hosts, rank the certainty of threats, and prioritize the ones that pose the highest risk.

If you're interested in becoming a Vectra technology partner, give us a shout at

Vectra is the sole visionary in the Gartner Magic Quadrant for IDPS

Security Information and Event Management

Vectra gives Security Information and Event Management systems rich insights into threats that are unseen by traditional security solutions by offering visibility into all phases of an attack -- unknown malware and attack tools, attacks that hide in common apps and encrypted traffic, and signs of internal recon, lateral movement and data exfiltration. Vectra also provides the most efficient and insightful starting point for investigations and SIEM rules by pre-correlating threat scores with compromised hosts.

Next-generation endpoint security

Endpoint-security solutions complement Vectra by providing rich contextual data about specific devices in the network, including machine name and operating system, that Vectra has detected are under attack. With comprehensive endpoint context, IT security teams can quickly identify malicious processes on the endpoint and respond efficiently.

Automated Security Orchestration

Vectra works with leading security orchestration platforms to automatically detect hidden cyber attack behaviors, pinpoint host devices at the center of an attack, and block threats before key assets are damaged or stolen. This enables faster enforcement actions by next-generation firewalls, endpoint security and network access control (NAC) solutions.

Traffic Optimization

Traffic optimization solutions augment Vectra by aggregating network traffic from SPAN and TAP ports for inspection and analysis as well as filtering unneeded traffic. They can also increase operational efficiency by load-balancing traffic, dynamically tightening filters and redirecting traffic to ensure high availability.


Vectra's Alex Waterman explains how Vectra detects previously unseen cyber attacks in public clouds using the Gigamon Visibility Platform on Amazon Web Services.

Next-generation firewalls

Vectra and next-generation firewalls create a formidable threat mitigation force. Vectra identifies infected hosts, their IP addresses and threat certainty and pushes this information to next-generation firewalls, which quarantine the infected hosts, stop communication with command-and-control servers, and prevent data exfiltration.

Virtual sensors

Virtual sensors extend Vectra threat intelligence to any corner of the network, including remote sites and internal segments that contain critical assets. By passively monitoring network traffic for malicious attack behaviors, virtual sensors enable IT security teams to quickly mitigate threats and prevent data loss and easily adapt to network changes.