Vectra Cognito, yapay zeka ile kuvvetlendirilmiş yeni nesil tehdit algılama ve tepki (threat detection and response) platformudur. Vectra Cognito, ağ tabanlı algılama ve tepki (network detection and response – NDR) özelliklerine sahiptir ve ağınızda bulunan tüm cihazların birbirleriyle olan iletişimini izler.
Vectra Cognito siber saldırılara karşı gerçek zamanlı koruma sağlar. Yani hem devam etmekte olan saldırıları algılar hem de bu saldırıları önem seviyelerine göre önceliklendirmeniz konusunda yardımcı olur.
Vectra Cognito platformu manuel süreçleri otomatik hale getirir. Binlerce olay (event) ve tarihsel içeriği konsolide ederek en riskli host’ları belirler. Otomatik veya manuel önlem alma konusunda ister direk Vectra platformu üzerinden ister mevcut siber güvenlik yatırımlarınızı kullanarak (SOAR, EDR, NAC..vb.) destek olur.
Vectra Cognito Platform

  • Cognito Detect
    • The power of AI to detect and prioritize in-progress attacks in real-time
      • Automate manual processes and consolidate thousands of events and historical context to pinpoint hosts that pose the biggest threat
      • Enable automatic and manual enforcement directly from the Vectra platform or take action through existing security investments like orchestration, EDR and NAC solutions.
      • High-fidelity visibility into attacker behaviors across all public clouds, SaaS apps, private data centers and enterprise environments
      • Unique context eliminates the endless hunt-and-search for threats and enables immediate action
  • Cognito Stream
    • Deliver scalable, security-enriched network metadata to feed custom detection and response tools
      • Actionable network data in Zeek format
      • Embedded with data science-derived security Insights
      • Associates network metadata with unique host attributes
  • Cognito Recall
    • AI-assisted threat hunting – from cloud and data center workloads to the enterprise
      • Custom-engineered investigative workbench optimized for Vectra metadata – delivering sub second searches at scale
      • Collect and store rich network metadata, relevant logs and cloud events in real-time
      • Perform retrospective threat hunting using security-enriched network metadata
      • Dive deep into incidents triggered by security tools to identify other host devices, accounts and attackers involved in an incident

Daha fazla bilgi almak için tıklayın.