Automated threat management and network self-defense
The future of network security. Uncover active cyber threats in the network using state-of-the-art artificial intelligence, enable fast response and block attacks automatically using Vectra - it's security that thinks.
Data science replaces signatures
Real-time automated threat detection
Automate Tier 1 security analysis
Yellow Cube is the sole distributor for Vectra Networks in the Central and Eastern European region.
Artificial intelligence is the new revolution. First machines replaced physical human muscle work, than computers replaced manual, paper-based work in every area of business. With new developments in AI, computers are now able to solve complex problems that require decision making and human thinking, and are revolutionizing the way we live today.
Vectra Networks is security that thinks, bringing AI to cybersecurity. Vectra uses machine learning and data science to identify threats based on their behavior, not on their fingerprints or signatures. This AI evolves with the company, using both supervised and unsupervised learning to uncover and respond to active cyber threats that were previously hidden and could only be detected previously with difficult manual work.
How does Vectra work?
Step 1 Choose the right data sourceThe better the datasource, the better the detection. To achieve high-fidelity, accurate detection Vectra analysis complete network traffic, which is superior to detection systems based on logs (SIEM), NetFlow or other incomplete data sources.
Step 2 Install on TAP or SPAN interfacesTo get the complete picture, Vectra is installed on core, access and virtual switches to intercept 100% of network traffic. Vectra is entirely passive, does not interfere in the operation of the network and installs in just minutes.
Step 3 Listen, learn and correlateAs Vectra processes all network traffic, it automatically detects the network topology, and the AI starts to learn and adopt it's capabilities to the local network. Knowing the kill chain of cyber attacks, Vectra correlates all information to discover attacks and anomalies in real-time.
Step 4 Detect active threats in real-timeRunning both supervised and unsupervised machine learning algorithms, Vectra detects active threats in real-time, regardless at what stage the attacker is in the cyber kill chain (exploitation, command and control, reconassaince, lateral movement, data theft, etc.)
Step 5 Triage and risk scoringVectra continously scores risks and hosts, and based on attack certainity and risk level, automatically highlights the largest threats against key assets.
Step 6 RemediationBased on the triage of threats, security opreators or automated security orchestration can remediate the attacks. Vectra provides clear instructions to verify and remedy detections, while providing complete packet captures for forensic analysis. Vectra also provides SIEM-integration and API.