Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

8 Controls to Thwart Sunburst and Other Supply Chain Attacks

Learn Gartner’s 12 steps and security controls of the SolarWinds attack that can be deployed to detect and possibly block the attack. Learn why Gartner finds network detection and response (NDR) necessary to defend against these types of attacks.

Breaking down the SolarWinds breach: an inside look at the methods used

The recent SolarWinds Orion hack infected an estimated 18,000 organizations. It demonstrates the need for a network detection and response (NDR) solution when taking steps to detect breaches that have bypassed preventative security, and to protect data. Network-based technologies are critical when countering the increasing sophistication of threats.

Cloud Identity Detections with Azure AD

Learn how Vectra provides complete cloud-to-ground security coverage, including an organization’s entire software-as-a-service (SaaS) ecosystem. This single configuration integration effectively puts an end to lateral movement no matter the account type, location or privilege.

Cognito Detect for Office 365

With the move to work from home, companies have adopted enabling cloud and SaaS apps, like Office 365, at accelerated speeds. And with more than 250 million users, Office 365 has become a tantalizing target for cyberattackers. Traditional security solutions only defend a perimeter that doesn’t really existing anymore or use malware signatures that are not in use and therefore can’t protect against cloud and SaaS attacks. In cloud and SaaS attacks, cybercriminals are going after accounts and credentials, bypassing these defenses. Watch how Vectra Cognito Detect for Office 365 can help you spot attacks that compromise Office 365 and Azure AD, prioritizing the threats that require your immediate focus to reduce SOC workloads by 34x.

EMA Securing Cloud Assets Report

The global pandemic acted as an accelerant to digital transformation initiatives, opening the floodgates for a rush of cloud migrations. Even before the fast shift to work from home, IT security professionals struggled to adapt to securing enterprise assets while moving to various cloud environments.

Case Study | Presented by Vectra Networks

Global financial services firm banks on NDR to stop cyberattacks

Learn how this global financial services firm was able to combat credential abuse in Office 365 and effectively hunt for threats vs. being reactive. With over $118 billion in assets, real-time visibility into the hidden actions of cyberattackers is critically important to this independent financial services company. Using Vectra, they are now able to detect and respond instantly to elusive cyberattacks against cloud and data center workloads, services like Microsoft Office 365, and user and IoT devices. They have 100% visibility and now know which attacks are critical, so they are not wasting time sifting through logs or false alerts.

IDC Business Value Report

IDC independently interviewed and analyzed Vectra’s large enterprise customers to demonstrate the significant value and IT impact organizations can achieve by leveraging the Vectra Cognito network detection and response platform.

IDC Business Value Report

IDC independently interviewed and analyzed Vectra’s large enterprise customers to demonstrate the significant value and IT impact organizations can achieve by leveraging the Vectra Cognito network detection and response platform.

O365 Spotlight Report

Microsoft continues to grow as the world’s most adopted SaaS application provider with over 258 million Office 365 and 75 million Teams users, according to the company’s third-quarter earnings call in 2020

Office 365 Threats and Inversion of the Corporate Network

The global pandemic has left a rippling impact on industries across the globe. Organizations have had to significantly transform and update their security strategy to protect against threats on assets and workloads accessed outside of the office “perimeter”.

Load More