
Why now

Avoid incident loss
Avoid incident loss by discovering hidden attackers early, before they accomplish their goals and well before other tools know about their presence.
Reduce costs
Reduce the costs associated with slow incident response by reducing attacker dwell-time beyond what is possible with other security tools.
Structure your hunts
Structure your hunts around specific types of attacker activities in your environment by using the MITRE ATT&CK framework.
Why Vectra
Proactively search for threats and investigate incidents across your entire environment including data center, cloud, and IoT devices.
Cognito Recall

Hunt

Investigate

Expose
Gain complete visibility into unseen security vulnerabilities and gaps in regulatory and compliance mandates.
Attackers can run, But they can’t hide

Hunt
High-fidelity data from machine learning-derived, security-enriched metadata – no packet captures or NetFlow.
Visibility using cloud logs and API calls. Integrate and share data with other security solutions – not just connectivity attributes.
Data-driven hunting with insights based on devices, privilege, identity, host names, and workloads – not solely IP addresses.

Investigate
Instant security insights give organizations complete visibility into relevant host activities and behaviors.
Observe and understand common threads between compromised host devices, accounts and assets.
Complete views of attack progression and campaigns help identify other issues related to the attack.
Expose
Identify and categorize gaps in compliance to meet government and corporate regulatory directives.
Visualize and report on security-policy posture with unique Vectra data that is not available in other products.
Extend and enhance security and compliance through recurring assessments, detailed reports, and other Vectra services.
Did you know?
Nearly half the breaches of sensitive data are the result of internal actors
Source: Forrester Research 2019
Command and control
- Externak remote access
- Hidden DNS tunnel
- Hidden HTTP/S tunnel
- Suspicious relay
- Suspect domain activity
- Malware update
- Peer-to-peer
- Pulling instructions
- Suspicious HTTP
- TOR activity
- Threat intel match
Reconnaissance
- Internal darknet scan
- Port scan
- Port sweep
- SMB account scan
- Kerberos account scan
- File share enumeration
- Suspicious LDAP query
- RDP recon
- RDC recon
Laternal movement
- Suspicious remote exec
- Suspicious remote desktop
- Suspicious admin
- Shell knocker
- Automated replication
- Brute-force attack
- SMB brute-force
- Kerberos brute force
- Suspicous kerberos client
- Suspicious kerberos account
- Kerberos server activity
- Ransomware file activity
- SQL injection activity
- Privilege access analytics
Exfiltration and botnet monetization
Exfiltration
- Data smuggler
- Smash and grab
- Hidden DNS tunnel
- Hidden HTTP/S tunnel
Botnet monetization
- Abnormal web or ad activity
- Cryptocurrency mining
- Brute-force attack
- Outbound DoS
- Outbound port sweep
- Outbound spam

