Vectra Forms SOC Visibility Triad
June 9, 2020
AI has made deep product integration with Microsoft Defender Advanced
Threat Protection (ATP) and Microsoft Azure Sentinel to elevate Vectra's
unique NDR detections to the Microsoft security platform in the Security
Operations Center (SOC) enabling more capability to prevent attackers
from establishing footholds across enterprise networks. Vectra has also
been invited to become a member of The Microsoft Intelligent Security
Association, an ecosystem of independent software vendors purpose-built
to defend against increasing cyber threats. A model of modern security
operations, the SOC visibility triad, anchored by Vectra's NDR platform,
provides organizations with full visibility into the threats that face
their network from cloud to ground.
Enrich the high-fidelity Vectra detections with deep process-level host-context from, giving professionals the information needed to pinpoint attackers.
Block and isolate attackers, not resources. Take surgical and immediate enforcement actions from Vectra closer to the source.
Customer benefits of Vectra
Integration with Microsoft Azure Sentinel include:
Automate incidents in Azure Sentinel based on configurable threat and certainty score thresholds from Vectra.
Perform forensic analysis on incidents to identify devices, accounts, and attackers involved. Leverage Vectra threat intelligence feed to proactively prevent future attacks.
integration of Azure Sentinel and Microsoft Defender ATP will help
further empower our customers by allowing them to reduce cyber noise and
focus on the most complex issues and threats," said Mandana Javaheri,
global director, Cybersecurity Solutions Group at Microsoft Corp. "The
complete visibility combined with high fidelity attacker behaviors
detections helps significantly strengthen our customers security