Vectra helps organizations address the GDPR
Complying with the GDPR requires putting appropriate technologies and processes in place. The Vectra cybersecurity platform augments cybersecurity teams and provides key technical capabilities needed to comply with the GDPR.
Vectra supports data protection by providing continuous, nonstop network traffic monitoring, real-time threat detection, triage, and incident reporting. Using artificial intelligence and attacker behaviour analytics, Vectra automatically hunts down active cyber threats across the enterprise network, from remote sites to campuses, data centres and the cloud. Vectra automates many of the labour-intensive tasks that are typically the responsibility of Tier 1 cybersecurity analysts and incident response teams. By automating these tasks, Vectra dramatically reduces the time spent on threat investigations by up to 90%, enabling security teams to focus on data loss prevention and mitigation.
Key capabilities of the Vectra cybersecurity platform include:
• Continuous monitoring and analysis of all network traffic, including Internet-bound traffic and internal network traffic between physical and virtual hosts with an IP address – such as laptops, servers, printers, BYOD, and IoT devices – regardless of the device type, operating system or application.
• Real-time visibility into network traffic by extracting metadata from packets rather than performing deep packet inspection allows protection without prying into personal or sensitive payload information.
• Analysis of metadata from captured packets with behavioural detection algorithms that spot hidden and unknown attackers, whether traffic is encrypted or not.
• Deterministic identification of attack behaviors, including the use of remote access Trojans, encrypted tunnels, botnet behaviors, ransomware, insider attackers, and targeted advance threats.
Vectra persistently tracks threats over time and across all phases of an attack, ranging from command and control (C&C), internal reconnaissance, lateral movement and, critically for GDPR, data exfiltration behaviors.
• Automatic correlation of threats with host devices under attack and threat detection details that include host context, packet captures, the seriousness of the threat, and certainty scores.
• Support for adaptive cybersecurity through an iterative process of improvement that leverages the work of the Vectra Threat Labs™, a group of highly-skilled security researchers, as well as behavioral detection algorithms that constantly learn from the local environment and from global trends.