Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Artificial Intelligence Threat Detection Firm Vectra Raises $100 Million

San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. This brings the total raised since the firm was founded in 2010 by James Harlacher and Mark Abene to $222.5 million. Vectra uses artificial intelligence to detect ‘in-progress’ cyber-attacks on the network.

San Jose, Calif-based network threat detection and response firm Vectra has closed a $100 million Series E funding round led by TCV and supported by existing investors. This brings the total raised since the firm was founded in 2010 by James Harlacher and Mark Abene to $222.5 million. Vectra uses artificial intelligence to detect ‘in-progress’ cyber-attacks on the network.

Vectra CEO Hitesh Sheth told SecurityWeek that the new funds will primarily be used for global market expansion. “One-third of our business today is in Europe and the Middle East, and we have just expanded our footprint into Japan, Australia and New Zealand. But there are still parts of Europe and parts of Asia with no presence. We’ll be expanding our business in these areas — and our U.S. business is still growing.”

Vectra AI LogoThe three primary purposes for the funding are to expand into new areas, to consolidate in existing areas, and to build the brand with additional marketing. Vectra’s products, based on its Cognito platform, are already stable and established. The sales model is to sell via local partners, and the additional presence will support those partners in what Sheth describes as ‘symbiotic’ relationships around the world.

Vectra uses artificial intelligence to detect attack footprints within network traffic metadata that might indicate a threat. “The cloud has inherent security blind spots, making it imperative to eliminate cyber-risks as enterprises move their business to the cloud,” said Sheth. “The Cognito platform enables them to stop hidden cyberattacks in the cloud.”

Those blind spots can often be found in the management plane of cloud-based infrastructure-as-a-service (IaaS models), and data leakage from stored databases. “The cloud is like the early days of on-prem data centers,” explained Sheth. “Security is always a late add-on to services, leaving gaps.” But everything that happens — good or bad — happens on the network; and knowledge of what happens will detect any intruder.

He gave the example of Amazon’s S3 buckets, where Amazon has only lately improved the security. Vectra won’t prevent people spinning up S3 buckets (although it will be aware that it has occurred), nor will it take much notice of S3 buckets in existence. “If they’re lying around and there’s nothing happening, we won’t really care; but the moment we see data leaving them, then we would care a lot.”

Sheth differentiates Vectra from other AI-based threat detection systems by stressing that it is not an anomaly detection system. “One of the biggest mistakes vendors have made is to treat this as an anomaly problem. It’s not, even though we also thought that in our early years. Anomaly detection generates spectacular graphics with spectacularly bad results. You have to deconstruct the way attackers think about the network, and then you can focus on the type of behavior an attacker will use.” All this can be found in the metadata.

“The problem with anomaly-based detection,” he continued, “is that it is unsupervised machine learning.” This is the basis of the huge number of alerts that can be generated by some systems. “The secret,” he said, “is in the way you blend supervised with unsupervised machine learning.”

Vectra’s Cognito platform is supported by three separate applications: Cognito Stream (sends security-enriched metadata to data lakes and SIEM); Cognito Recall (a cloud-based application to store and investigate threats in enriched metadata); and Cognito Detect (real-time analytics). “They’re all distinct in what they do,” said Sheth, “and customers can start with any one of them. Once one has been deployed, there is no more infrastructure required to adopt either or both of the others.”

Advertisement. Scroll to continue reading.

Vectra closed its Series D funding round for $36 million in February 2018.

Related: Cyberattacks Against Energy Sector Are Higher Than Average 

Related: Hunting the Snark with Machine Learning, Artificial Intelligence, and Cognitive Computing 

Related: The Current Limitations and Future Potential of AI in Cybersecurity 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.