“Every network has likely been hacked, but they just don’t know it yet,” he says.
To help organizations identify intruders so they can root them out, Vectra built software that uses machine learning and behavior analysis to identify patterns that occur during attacks and seek out intruders before they figure out what they want to destroy or steal and tunnel it out of the network.
“It’s not what the malware is, it’s what the malware does,” notes Banic, who met with me last week at TMC (News - Alert) Editor’s Day Silicon Valley. However, he adds that there’s a difference between malware and cyberattacks and threats, and that you don’t need one to do the other.
The solutions from two-year-old Vectra fill the gap between perimeter security tools and tools for forensic cleanup. Vectra competitors include Darktrace, a U.K. company led by former Autonomy (News - Alert) staff members, and LightCyber, which was founded in 2011 and has offices in Los Altos, Calif., and Ramat Gan, Israel.
Banic says Vectra’s differentiators include its easy-to-use interface, its high level of real-time automation, and the fact that it correlates all behavior it detects to the host that is under attack. It’s the culmination of that activity, he says, that enables Vectra to show its customers where their highest risk is so they know what most deserves their attention. Vectra is also working on solutions that could prescribe actions in various security breach scenarios, Banic adds.
Among Vectra’s customers are Aruba/HP, Jackson Health System of Florida, Pinterest, and Tri-State Generation and Transmission Association out of Denver. All of these customers are leveraging Vectra to protect their intellectual property.