News By Tag
News By Place
Follow on Google News
Vectra AI recognized in latest Gartner® Market Guide for Network Detection and Response (NDR)
The Gartner 2022 Market Guide for Network Detection and Response report (https://info.vectra.ai/
According to the report, "Organisations rely on NDR to detect and stop activity after a successful attack, such as ransomware, threats from within the network or lateral network traffic. NDR complements other technologies that trigger alerts primarily based on rules and signatures, building heuristic models of normal network behaviour and anomaly detection." The report further mentions that "Security and risk management leaders should prioritise NDR as a complement to other detection tools, as it focuses on low false alarm rates and anomaly detection that other solutions do not cover."
- 'We believe that Vectra AI's recognition in the Gartner Market Guide confirms our position as a trusted partner offering proven solutions for network detection and response,' says Christian Borst, EMEA CTO at Vectra AI, awarded in the Representative Vendors in Network Detection and Response category.
- To stem the tide of threats, security teams need full visibility into their environments so they can detect signs of an attack before it becomes a breach. With the right configuration, NDR can provide effective protection against ransomware, he points out.
Vectra's threat detection and response platform analyses network packets using hardware device sensors and virtual software sensors. It also works directly with some SaaS APIs and logs from cloud-based IaaS directory services to provide threat detection and response to these use cases. Vectra NDR is based on multiple detection engines, with a strong focus on machine learning and deep learning methods for behavioural analytics-based detection. The platform uses its own threat intelligence sources during analysis, and customers can also import their own threat intelligence sources.
To develop their network detection and response capabilities, security and risk management leaders should:
Account Email Address Account Phone Number Disclaimer Report Abuse