Vectra AI, a globally renowned company in threat detection and response, has announced that the Vectra Cognito platform delivers key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers.

Vectra AI

Vectra AI is uniquely positioned as an integral part of the model, which assumes breaches by investigating the behavior of users, workloads, networks, and devices as though they originate from an untrusted network by leveraging its analytics and understanding of users and accounts, tracking them between on-premise and the Cloud.

Since cloud applications and a mobile workforce have redefined the security perimeter, and corporate resources and services now often bypass on-premises, perimeter-based security models that rely on network firewalls and VPNs have become obsolete.

Zero Trust Maturity Model

With the integration of the Vectra Cognito platform, customers will have access to AI-powered threat detection

To address this, Microsoft Corporation developed the Zero Trust Maturity Model, to adapt to the complexities of modern environments effectively. With the integration of the Vectra Cognito platform, customers will have access to AI-powered threat detection, to monitor and verify the communications to their business-critical applications.

The Vectra Cognito platform was developed on the idea that standard, static security measures, like firewalls, NAC, and VPNs, were not enough to protect the modern enterprise,” said Randy Schirman, Vectra AI’s Vice President (VP) of Partnerships, adding “With the hybrid remote work model effectively rendering traditional security measures obsolete, we are completely aligned with the Microsoft Zero Trust Model approach.

Vectra Cognito Platform with AI

The Vectra Cognito Platform uses AI (Artificial Intelligence) to efficiently find and prioritize hidden attacks in real time, inside Microsoft 365, Azure Active Directory (AD), the Cloud, data center, IoT, and enterprise networks, before attackers cause irreparable harm to the organization.

The platform allows security teams to prevent attacks earlier in the kill chain, ensuring that applications essential to business continuity are available and accessible for the entire extended workforce.

Vectra will help deliver visibility and analytics on the Zero Trust framework’s three guiding principles:

  • Verify explicitly - Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies.
  • Use least privileged access - Limit user access with Just-in-Time and Just-Enough (JIT/JEA), risk-based adaptive polices, and data protection to protect both data-based adaptive polices, and data protection to protect both data and productivity.
  • Assume breach - Minimize blast radius for breaches and prevent lateral movement, by segmenting access by network, user, devices, and application awareness. Verify all sessions are encrypted end-to-end. Use analytics to get visibility, drive threat detection and improve defenses.

Enhanced threat detection and response

Threat detection and response that accurately detects network anomalies and account takeover, by monitoring user and machine behavior, is a core capability for Zero Trust,” said Desmond Forbes, the Senior Director of Business Development at Microsoft.

Desmond Forbes adds, “Vectra, provides customers with visibility into their hybrid cloud environments, the accounts use, and integrates that information with Microsoft Defender for Endpoint and Azure Sentinel, to meet our joint customers’ Zero Trust objectives.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...