Vectra AI
Vectra AI
  • Видео 321
  • Просмотров 2 680 949
Stories from the SOC: Sr. Security Analyst, Eric Martin
Learn more about Eric Martin, Sr. Security Analyst on the Vectra MXDR and MDR team!
-- About Vectra --
Vectra is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra’s Attack Signal Intelligence™ detects and correlates attacker behaviors - the TTPs at the heart of all attacks. The resulting alert signal clarity enables security operations teams to rapidly prioritize, investigate and respond to the most urgent cyber-attacks and stop them from becomin...
Просмотров: 54

Видео

Get to know the Vectra Support Team! - Jina
Просмотров 2916 часов назад
Meet Jina Patton, Vectra AI Technical Support Engineer. About Vectra Vectra is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra’s Attack Signal Inte...
Get to know the Vectra AI Support team! - Sanjay
Просмотров 33День назад
Meet Sanjay Raghuwanshi. Technical Support Engineer at Vectra AI. About Vectra Vectra is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra’s Attack S...
Get to know the Vectra AI Support Team! - Felipe
Просмотров 34День назад
Meet Felipe Santa Ana, Vectra AI Technical Support Engineer. About Vectra Vectra is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra’s Attack Signal...
Vectra MXDR x SentinelOne Demo
Просмотров 92День назад
Discover the power of Vectra MXDR. Learn more at www.vectra.ai/products/mdr About Vectra Vectra is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra’...
Vectra AI Threat Briefing: Insider Threats
Просмотров 6814 дней назад
Hear from Vectra AI's Tiffany Nip, Product Marketing Manager, and John Mancini, Principal Product Manager as they unpack insider threats and what you can do about them. 00:00 Vectra AI Threat Briefing: Insider Threats 00:23 What Does a Modern Insider Threat Look Like? 01:50 An Insider Threat in Action 03:25 Why is Defending Against Inside Threats Difficult? 05:21 How Does Vectra AI Defend Again...
What is Identity Threat Detection & Response (ITDR)?
Просмотров 7414 дней назад
Hear from Vectra AI's Tiffany Nip, Product Marketing Manager, and John Mancini, Principal Product Manager as they answer top questions about ITDR. 00:00 What is Identity Threat Detection & Response (ITDR)? 00:45 Why Defending Against Identity Attacks is Difficult 02:11 Understanding ITDR 03:27 Differences Among Current ITDR Solutions 05:31 Important Criteria for Evaluating an ITDR Solution 06:0...
Syslog to Kafka
Просмотров 4814 дней назад
In this video, a Vectra Supoprt engineer will walk you through the steps to send syslog information to kafka. More information can be found in knowledge base article 1155 on the Vectra Support Site. support.vectra.ai/s/article/KB-VS-1155
x29platform
Просмотров 3514 дней назад
In this videa, a Vectra Engineer examines the X29 platform, including the frnt and rear panels, network connectivity and initial configuration.
Graceful Shutdown
Просмотров 1814 дней назад
In this video we show you how to gracefully shutdown and reboot both your Vectra brain and Sensors for circumstances where you may need to move your machines or reconfigure networking.
Provision a vSensor via CLI
Просмотров 1714 дней назад
This video walks you through the steps of provisioning a virtual sensor via the CLI of your brain.
Enable VPN For Support
Просмотров 1414 дней назад
In this video, we show you how to enable the VPN to allow a Vectra Supoprt Engineer to remotely access and troubleshoot your Vectra brain, including how to configure this through a proxy server.
XDR Best Practices
Просмотров 12114 дней назад
Hear from Vectra AI Sr. Product Marketing Manager, Nicole Drake and Lead Sales Engineer, J.R. Goldman as they cover best practices for implementing and using an XDR solution. 00:00 XDR Best Practices 00:30 What is XDR? 01:59 What Should You Look for in an XDR? 06:51 Going Beyond SIEM and EDR Learn more about the power of AI-driven XDR, here: www.vectra.ai/resources/ai-in-xdr-what-it-means-and-w...
Vectra AI July Platform Enhancements
Просмотров 12521 день назад
Join Vectra AI Product Marketing Managers Zoey Chu and Tiff Nip as they discuss exciting new platform enhancements for Vectra AI customers. 00:00 Vectra AI July Platform Enhancements 00:20 New Suspicious Copilot for M365 Access 01:39 Threat Surface Discover Dashboard 03:02: M365 Phishing Simulation Detection 04:36 M365 SecOps Mailbox Detection 06:04: Threat Scoring Enhancement 07:10 Traffic Val...
Cyber Specialist vs. Generalist: Which is Better?
Просмотров 11421 день назад
Uncover the unique differences between specialists and generalists in cybersecurity in this brief discussion between Mark "Woj" Wojtasiak, VP of Product at Vectra AI, and Erik Weakland, Director of Information Security at American University. 00:00 Cyber Specialist vs. Generalist: Which is Better? 00:56 Introduction to Erik Weakland 04:55 The Difference Between Specialists & Generalists 12:40 G...
Integrating SOARs in the Vectra AI Platform
Просмотров 174Месяц назад
Integrating SOARs in the Vectra AI Platform
Vectra AI at RSA: Nasdaq Interview
Просмотров 143Месяц назад
Vectra AI at RSA: Nasdaq Interview
Offensive Security: Red Teaming Attackers Bypassing Endpoint & Firewall Controls
Просмотров 114Месяц назад
Offensive Security: Red Teaming Attackers Bypassing Endpoint & Firewall Controls
The Evolution of Attack Signal Intelligence
Просмотров 157Месяц назад
The Evolution of Attack Signal Intelligence
Vectra AI Analyst Experience
Просмотров 108Месяц назад
Vectra AI Analyst Experience
Signature Support in the Vectra AI Platform
Просмотров 63Месяц назад
Signature Support in the Vectra AI Platform
GenAI Part 5 : Defenders Using LLMs
Просмотров 49Месяц назад
GenAI Part 5 : Defenders Using LLMs
GenAI Part 4: How Attackers Use LLMs
Просмотров 38Месяц назад
GenAI Part 4: How Attackers Use LLMs
GenAI Part 3: How LLMs Operate
Просмотров 36Месяц назад
GenAI Part 3: How LLMs Operate
GenAI Part 2: What are LLMs
Просмотров 94Месяц назад
GenAI Part 2: What are LLMs
GenAI Part 1: History of LLM
Просмотров 201Месяц назад
GenAI Part 1: History of LLM
Microsoft Identity Security Testing
Просмотров 131Месяц назад
Microsoft Identity Security Testing
Stories from the SOC
Просмотров 1022 месяца назад
Stories from the SOC
May Vectra AI Platform Release Highlights
Просмотров 1632 месяца назад
May Vectra AI Platform Release Highlights
How Does Vectra AI Fill Identity Security Gaps in Microsoft?
Просмотров 2262 месяца назад
How Does Vectra AI Fill Identity Security Gaps in Microsoft?

Комментарии

  • @clivebream4559
    @clivebream4559 7 дней назад

    Thank you for these podcasts, please keep them coming

  • @ashokreddy3716
    @ashokreddy3716 27 дней назад

    It is good threat briefing

  • @soyouz666
    @soyouz666 2 месяца назад

    Great content with the MFA video, thank you

  • @KenSvensson
    @KenSvensson 3 месяца назад

    You have a typo, should say "Podcast" not "Prodcast"

    • @VectraAI
      @VectraAI 2 месяца назад

      Hi Ken, this is a product podcast titled "Prodcast." Hope you enjoy our series.

  • @mattpears2472
    @mattpears2472 3 месяца назад

    tldr; gpt to phish people better, access your account eg gpt, claude, copilot, ask /make the model what info it knows about you. solution; dont assume any email is real.

  • @sizusfiveus
    @sizusfiveus 6 месяцев назад

    This is the future of cybersecurity.

  • @pummyy
    @pummyy Год назад

    If Jim has XDR installed along with SSE, I don't see that use case eligible at all. Doesn't matter where gym is no attack surface no Lateral Movement.

  • @digitalmarketingspseoexpert
    @digitalmarketingspseoexpert Год назад

    NICE

  • @humbertoramirez1492
    @humbertoramirez1492 Год назад

    Do a

  • @paulinacastillo4449
    @paulinacastillo4449 Год назад

    hubieran subido alguna practica de ejemplo

  • @alexgroyz559
    @alexgroyz559 Год назад

    Great stuff!

  • @vedprakashsrivastava2516
    @vedprakashsrivastava2516 Год назад

    In Vectra add on for stream in which scripts to add the API detail

  • @bookdiary2895
    @bookdiary2895 Год назад

    Do u have 720P video ? 360p picture video is blur so much

  • @florianbeck7681
    @florianbeck7681 Год назад

    highly recommended & 37 well invested minutes! :-)

  • @chrisweinmann8675
    @chrisweinmann8675 Год назад

    Really amazing messaging and a great storyteller as well! :-)

  • @NunoGuerreiroLive
    @NunoGuerreiroLive Год назад

    Not sure if someone can calrify, but in ATT&CK we have mitigations (not detailed as I see them) but the counter-measures in D3FEND are more detailed from the defend point of view. Is this correct ?

  • @NunoGuerreiroLive
    @NunoGuerreiroLive Год назад

    this talk is awesome. Thanks to John and Vectra.

  • @Nikoolayy1
    @Nikoolayy1 Год назад

    This can work together with Vectra AWS VPC mirroring to a Cloud sensor right?

    • @VectraAI
      @VectraAI 3 месяца назад

      This is a supported configuration as discussed in the following Vectra Knowledgebase Article: support.vectra.ai/s/article/KB-VS-1090 The relevant section states: The input to an AWS Sensor can be Amazon VPC traffic mirroring set up on an Amazon elastic network interface or from a VXLAN-based 3rd party packet brokers. For further information on this, please review the AWS Deployment Guide pdf attached to this article.

  • @RashadPrince
    @RashadPrince 2 года назад

    @2:36 did I hear someone say "facts"? 😊👏

  • @RizCasimir
    @RizCasimir 2 года назад

    Why in such bad quality?

  • @shaqfufu8908
    @shaqfufu8908 2 года назад

    This is great didn’t know about defend framework

  • @VectraAI
    @VectraAI 2 года назад

    Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn

  • @VectraAI
    @VectraAI 2 года назад

    Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn

  • @VectraAI
    @VectraAI 2 года назад

    Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn

  • @VectraAI
    @VectraAI 2 года назад

    Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn

  • @VectraAI
    @VectraAI 2 года назад

    Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn

  • @VectraAI
    @VectraAI 2 года назад

    Do you want to know if ransomware's damages are irreversible? How to recover from ransomware? ► bit.ly/how-to-recover-from-ransomware

  • @ramkundala4925
    @ramkundala4925 2 года назад

    Great end2end product feature perspective Q&A session

    • @VectraAI
      @VectraAI 2 года назад

      Thanks you Ram for your comment. We are glad you found our webinar of interest! Feel free to subscribe to our channel, we are producing more content to come soon!

  • @scpaxolotl8263
    @scpaxolotl8263 2 года назад

    cool

  • @EIDEID99
    @EIDEID99 2 года назад

    We need an App like this for Qradar users.

    • @VectraAI
      @VectraAI Год назад

      We do have one now: ruclips.net/video/YuELC3DhXSk/видео.html

  • @afrahfathima8866
    @afrahfathima8866 3 года назад

    Very informative and good presentation

    • @VectraAI
      @VectraAI 2 года назад

      Glad it was helpful!

  • @ITHunt-
    @ITHunt- 4 года назад

    Nice topic

  • @Luis-qu6lk
    @Luis-qu6lk 4 года назад

    So is it dangerous to pick up someone's used printer? Can the actual printer have malware?

  • @abhishekkumarpandey1968
    @abhishekkumarpandey1968 4 года назад

    Me, as an Indian, am thinking that, how can I do these exact things to the customers for a cheaper price, better than this company. The first problem an Indian company would face is not a pool of skilled data scientists and machine learning professionals to built algorithms, but, data to check the authenticity of the algorithms. This guy has not named the clients his company is dealing with.

  • @sneakyjoe12
    @sneakyjoe12 4 года назад

    This has been a great resource. Thanks!

  • @jt1738x
    @jt1738x 4 года назад

    class

  • @Sagaofsr
    @Sagaofsr 5 лет назад

    Really helpful, thank you

  • @JosephMcCray
    @JosephMcCray 5 лет назад

    This is by far the best talk on Machine Learning for Security that I have EVER seen. Good job at making something short and sweet that I going to be recommending to customers. Damn good job!

  • @numankarakas1031
    @numankarakas1031 5 лет назад

    Hi , You should develop product to support VXLAN. Thank you

  • @rss245x
    @rss245x 7 лет назад

    Your video did not show what happened when the dialog box displayed. Are you assuming the user clicks the OK button to infect or would clicking on the red X to close the dialog do the same thing? How can this vulnerability be tested? I assume such vulnerabilities are handled by most firewall software out there would that be safe to say?

    • @VectraAI
      @VectraAI 2 года назад

      At the minute 4:40, you see an example of an interaction from a user perspective. No matter what you select (OK or the Red Cross) you would end up being infected. What is interesting with this exploit is that the user does not have to interact to be hacked. As soon as you try to connect to the printer, the windows machine is owned, no matter what the user is answering.

  • @eldanicarvajal
    @eldanicarvajal 8 лет назад

    Can you publish de POC information?

    • @VectraAI
      @VectraAI 2 года назад

      We do not publish the details of the POC, but a few people have been doing it since the video has been released. You would just need to build a printing server and replace the driver to be installed by a malicious payload (DLL).

    • @eldanicarvajal
      @eldanicarvajal 2 года назад

      @@VectraAI 5 years later, but thank you!