https://store-images.s-microsoft.com/image/apps.56797.5e215574-5a3c-468e-b6a8-52e1dd47badf.770cb04a-d080-46bb-b5ef-aede51c8f8b6.5a5432d2-3807-4fb8-8eec-d1d8738b7e16

Vectra Sensor & Stream for Azure

Vectra AI, Inc

Vectra Sensor & Stream for Azure

Vectra AI, Inc

Intelligent, AI-driven threat detection and response for native and hybrid clouds

Designed by an award-winning team of data scientists and threat researchers, the Vectra platform represents the rich, security-enriched data output of a holistic approach to security – capturing network metadata at scale, enriching it with machine learning-derived security information and flexibly applying it across Vectra products.
Cognito Sensors provide native visibility into attacker behaviors in the Azure cloud. The Azure Virtual Network TAP copies virtual network traffic into, out of and between virtual machines and makes it available to the Cognito Sensor running in Azure. The Cognito Brain then extracts security-enriched metadata from this traffic for real-time detection and prioritization of advanced threats. Cognito Sensors enable Vectra to provide complete cyberattack visibility – without requiring agents – into Azure cloud environments. Unlike agent-based traffic visibility and security products, the Azure Virtual Network TAP will collect network traffic from the hypervisor to avoid compromises and vulnerabilities that affect agents on virtual machines. Cognito Sensors monitor and collect all traffic through the Azure Virtual Network TAP and send it to the Cognito Brain for real-time analysis of attacker behaviors.
Cognito Stream sends security-enriched metadata to data lakes and SIEMs. Hundreds of metadata attributes are extracted from raw cloud traffic and presented in a compact, easy-to-understand Zeek format that leverages existing software tooling. Security insights generated by machine learning are embedded in the enriched metadata to provide powerful building blocks that threat hunters can combine with their own unique expertise to reach faster conclusions. Cognito Stream automatically associates security-enriched metadata with other attributes to create a unique host identity. This enables security analysts to efficiently investigate hosts, regardless of IP address changes as well as explore relationships between groups of hosts.
https://store-images.s-microsoft.com/image/apps.33395.5e215574-5a3c-468e-b6a8-52e1dd47badf.c7c574b1-07f3-48f8-b93d-50a0d3d11920.1def26af-d70e-4e2e-bccc-05603544227e
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.33395.5e215574-5a3c-468e-b6a8-52e1dd47badf.c7c574b1-07f3-48f8-b93d-50a0d3d11920.1def26af-d70e-4e2e-bccc-05603544227e
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.27151.5e215574-5a3c-468e-b6a8-52e1dd47badf.c7c574b1-07f3-48f8-b93d-50a0d3d11920.ee15eec4-2af1-430f-b190-21390b6ecb35
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.46265.5e215574-5a3c-468e-b6a8-52e1dd47badf.a1919874-803b-45f0-92a8-625058a0a361.f2ba312b-5a95-4304-941a-5da22be336c5