Vectra AI

Vectra AI

Vectra
+
+

Related Products

  • Blumira
    145 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • ManageEngine Log360
    134 Ratings
    Visit Website
  • Adaptive Security
    82 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • ManageEngine OpManager
    1,577 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    82 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website

About

Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Vectra is Security that thinks. We have developed an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform.

About

Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security centers or IT administrators who want an AI cybersecurity platform to protect their SaaS, cloud and on-premises deployments

Audience

IT security teams in search of a solution to improve all their network operations and increase security

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.7 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Vectra
Founded: 2010
United States
www.vectra.ai/

Company Information

Zscaler
Founded: 2008
United States
www.zscaler.com

Alternatives

Arista NDR

Arista NDR

Arista

Alternatives

NextRay NDR

NextRay NDR

NextRay AI
Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Integrations

Azure Marketplace
Cybraics
GigaSECURE
OverSOC
Revelstoke
Swimlane
Amazon Web Services (AWS)
Elastic Observability
Forescout
IGEL
Microsoft 365
Microsoft Azure
Multi-Domain Security Management
New Era
Proofpoint Insider Threat Management
SecureW2
Splunk SOAR
Teamstack
The Respond Analyst
Truto

Integrations

Azure Marketplace
Cybraics
GigaSECURE
OverSOC
Revelstoke
Swimlane
Amazon Web Services (AWS)
Elastic Observability
Forescout
IGEL
Microsoft 365
Microsoft Azure
Multi-Domain Security Management
New Era
Proofpoint Insider Threat Management
SecureW2
Splunk SOAR
Teamstack
The Respond Analyst
Truto
Claim Vectra AI and update features and information
Claim Vectra AI and update features and information
Claim Zscaler and update features and information
Claim Zscaler and update features and information