Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 6 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Vectra and Phantom partner to detect, prioritise and stop hidden cyber-attacks faster

by The Gurus
November 9, 2017
in Editor's News
Share on FacebookShare on Twitter

Vectra, the leader in automating the hunt for in-progress cyber-attacks, and Phantom, the leader in security automation and orchestration, today announced a partnership to automate threat detection and response, and the availability of the Vectra App for Phantom.
 
“Faster incident response is critical, but faced with a severe shortage of cybersecurity skills, enterprises are turning to security operations and analytics platform architecture, or SOAPA,” said Jon Oltsik, senior principal analyst at the Enterprise Strategy Group. “This architecture enables cooperation amongst security tools while helping security analysts pivot across tools to find data and take action as they need in real time.”
 
“Vectra and Phantom share a mission to automate threat detection and response,” said Mike Banic, vice president of marketing at Vectra. “The Cognito platform from Vectra uses AI to automate the detection, triage, correlation and prioritisation of threats, and our partnership with Phantom enables automated security orchestration with a broad ecosystem of partners.”
 
The Vectra App for Phantom enables the prioritised threats detected by Cognito, as well as the host and detection context about these threats, to flow into the Phantom Security Automation and Orchestration platform.
 
Phantom playbooks then drive automated contextual correlation with indicators from other security tools and active enforcement based on prescriptive actions that enable security teams to stop threats faster – from data centre and cloud workloads to user and internet-of-things (IoT) devices.
 
With the Vectra App for Phantom, security teams can:
 

  • Take action to stop threats faster – From the Cognito platform, security operations teams can use Phantom playbooks to take specific actions against in-progress attacks, such as blocking or quarantining a high-risk workload or device or killing a process.
  • Streamline threat investigations – Together, Cognito and Phantom enable security teams to accelerate threat investigations using automated or semi-automated workflows to correlate host and detection information from Cognito with information from other security tools. The combined insights from across the security ecosystem reduce complex threat investigation times.
  • Automate investigations for critical detection types – With insights from Cognito and the orchestration power of Phantom, security teams can quickly identify critical threats like ransomware, lateral movement or data exfiltration, and speed-up threat investigations.
  • Enrich threat investigations with rich data – When managing cases through Phantom, security operations teams can tap into vast data from Cognito to reveal hidden attacker behaviours across the kill chain and gain more detailed views of every threat.

 
“The key to successful automation is having good threat data to act on,” said Rich Hlavka, vice president of business development at Phantom. “Cognito from Vectra prioritises and drives Phantom automation based on the threat level and certainty of an attack, ensuring better accuracy. Our automation playbooks help to reduce the analyst workload and increase consistency in the SOC.”

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweetShare
Previous Post

A third of the UK plans to grab a bargain this Cyber Monday

Next Post

Three Keys to DDoS Defence: Monitor, Protect, Communicate

Recent News

safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023
london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information