Тёмный
Vectra AI
Vectra AI
Vectra AI
Подписаться
Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra AI platform and MDR services provide attack coverage across public cloud, SaaS, identity and network infrastructure. Unlike traditional threat detection approaches that simply alert on what is “different”, Vectra AI’s Attack Signal Intelligence detects and correlates attacker behaviors - the TTPs at the heart of all attacks. The resulting alert signal clarity enables security operations teams to rapidly prioritize, investigate and respond to the most urgent cyber-attacks and stop them from becoming breaches. Organizations worldwide rely on the Vectra platform and MDR services to get ahead and stay ahead of attackers. For more information, visit www.vectra.ai.
Vectra AI Respond UX Demo
9:48
16 часов назад
Vectra MXDR x SentinelOne Demo
11:18
21 день назад
Syslog to Kafka
9:33
Месяц назад
x29platform
5:52
Месяц назад
Graceful Shutdown
3:05
Месяц назад
Provision a vSensor via CLI
7:21
Месяц назад
Enable VPN For Support
7:27
Месяц назад
XDR Best Practices
8:08
Месяц назад
Vectra AI July Platform Enhancements
8:27
Месяц назад
Vectra AI at RSA: Nasdaq Interview
5:56
Месяц назад
Vectra AI Analyst Experience
14:54
Месяц назад
GenAI Part 5 : Defenders Using LLMs
30:32
Месяц назад
GenAI Part 4: How Attackers Use LLMs
25:28
Месяц назад
Комментарии
@cyberSeurity
@cyberSeurity День назад
Vectra is great tools for network flow monitoring. We are using since last 6 year . What I noticed Vectra is not good is case any system impacted by the keyloger I believed ?
@cyberSeurity
@cyberSeurity День назад
Hello everyone.
@clivebream4559
@clivebream4559 17 дней назад
Thank you for these podcasts, please keep them coming
@ashokreddy3716
@ashokreddy3716 Месяц назад
It is good threat briefing
@soyouz666
@soyouz666 2 месяца назад
Great content with the MFA video, thank you
@KenSvensson
@KenSvensson 4 месяца назад
You have a typo, should say "Podcast" not "Prodcast"
@VectraAI
@VectraAI 2 месяца назад
Hi Ken, this is a product podcast titled "Prodcast." Hope you enjoy our series.
@mattpears2472
@mattpears2472 4 месяца назад
tldr; gpt to phish people better, access your account eg gpt, claude, copilot, ask /make the model what info it knows about you. solution; dont assume any email is real.
@sizusfiveus
@sizusfiveus 6 месяцев назад
This is the future of cybersecurity.
@pummyy
@pummyy Год назад
If Jim has XDR installed along with SSE, I don't see that use case eligible at all. Doesn't matter where gym is no attack surface no Lateral Movement.
@digitalmarketingspseoexpert
NICE
@humbertoramirez1492
@humbertoramirez1492 Год назад
Do a
@paulinacastillo4449
@paulinacastillo4449 Год назад
hubieran subido alguna practica de ejemplo
@alexgroyz559
@alexgroyz559 Год назад
Great stuff!
@vedprakashsrivastava2516
@vedprakashsrivastava2516 Год назад
In Vectra add on for stream in which scripts to add the API detail
@bookdiary2895
@bookdiary2895 Год назад
Do u have 720P video ? 360p picture video is blur so much
@florianbeck7681
@florianbeck7681 Год назад
highly recommended & 37 well invested minutes! :-)
@chrisweinmann8675
@chrisweinmann8675 Год назад
Really amazing messaging and a great storyteller as well! :-)
@NunoGuerreiroLive
@NunoGuerreiroLive Год назад
Not sure if someone can calrify, but in ATT&CK we have mitigations (not detailed as I see them) but the counter-measures in D3FEND are more detailed from the defend point of view. Is this correct ?
@NunoGuerreiroLive
@NunoGuerreiroLive Год назад
this talk is awesome. Thanks to John and Vectra.
@Nikoolayy1
@Nikoolayy1 Год назад
This can work together with Vectra AWS VPC mirroring to a Cloud sensor right?
@VectraAI
@VectraAI 4 месяца назад
This is a supported configuration as discussed in the following Vectra Knowledgebase Article: support.vectra.ai/s/article/KB-VS-1090 The relevant section states: The input to an AWS Sensor can be Amazon VPC traffic mirroring set up on an Amazon elastic network interface or from a VXLAN-based 3rd party packet brokers. For further information on this, please review the AWS Deployment Guide pdf attached to this article.
@RashadPrince
@RashadPrince 2 года назад
@2:36 did I hear someone say "facts"? 😊👏
@RizCasimir
@RizCasimir 2 года назад
Why in such bad quality?
@shaqfufu8908
@shaqfufu8908 2 года назад
This is great didn’t know about defend framework
@VectraAI
@VectraAI 2 года назад
Thank you for your feedback! We are glad you found our video of interest. Here is an interesting article about the MITRE D3FEND framework as well: www.vectra.ai/blogpost/mitre-d3fend-framework
@VectraAI
@VectraAI 2 года назад
Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn
@VectraAI
@VectraAI 2 года назад
Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn
@VectraAI
@VectraAI 2 года назад
Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn
@VectraAI
@VectraAI 2 года назад
Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn
@VectraAI
@VectraAI 2 года назад
Watch more from John Buyn in this on-demand webcast! bit.ly/3xvZaQn
@VectraAI
@VectraAI 2 года назад
Do you want to know if ransomware's damages are irreversible? How to recover from ransomware? ► bit.ly/how-to-recover-from-ransomware
@ramkundala4925
@ramkundala4925 2 года назад
Great end2end product feature perspective Q&A session
@VectraAI
@VectraAI 2 года назад
Thanks you Ram for your comment. We are glad you found our webinar of interest! Feel free to subscribe to our channel, we are producing more content to come soon!
@scpaxolotl8263
@scpaxolotl8263 2 года назад
cool
@EIDEID99
@EIDEID99 2 года назад
We need an App like this for Qradar users.
@VectraAI
@VectraAI Год назад
We do have one now: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-YuELC3DhXSk.html
@afrahfathima8866
@afrahfathima8866 3 года назад
Very informative and good presentation
@VectraAI
@VectraAI 2 года назад
Glad it was helpful!
@ITHunt-
@ITHunt- 4 года назад
Nice topic
@Luis-qu6lk
@Luis-qu6lk 4 года назад
So is it dangerous to pick up someone's used printer? Can the actual printer have malware?
@VectraAI
@VectraAI 2 года назад
There are many frameworks that exists that would allow to get access to your windows machine. If Microsoft has fixed most vulnerabilities, there are still potential opportunities to hack machines. If you are interested, you can have a look at PRET - Printer Exploitation Toolkit. This tool allows you to gain control of the printer and the clients connecting to it.
@abhishekkumarpandey1968
@abhishekkumarpandey1968 4 года назад
Me, as an Indian, am thinking that, how can I do these exact things to the customers for a cheaper price, better than this company. The first problem an Indian company would face is not a pool of skilled data scientists and machine learning professionals to built algorithms, but, data to check the authenticity of the algorithms. This guy has not named the clients his company is dealing with.
@sneakyjoe12
@sneakyjoe12 4 года назад
This has been a great resource. Thanks!
@jt1738x
@jt1738x 4 года назад
class
@Sagaofsr
@Sagaofsr 5 лет назад
Really helpful, thank you
@JosephMcCray
@JosephMcCray 5 лет назад
This is by far the best talk on Machine Learning for Security that I have EVER seen. Good job at making something short and sweet that I going to be recommending to customers. Damn good job!
@JCat007x1
@JCat007x1 5 лет назад
I feel like if he did an hour-long lecture it would be even better. This is just for my case, as someone looking to study machine learning more.
@daikennett
@daikennett 4 года назад
Here here! Also oh my god it is THE joe mccray, man your vids practically taught me SQL Injection man! Thanks for your work & community. If I ever see you at a con a rum and coke on me is waiting for you!
@numankarakas1031
@numankarakas1031 6 лет назад
Hi , You should develop product to support VXLAN. Thank you
@rss245x
@rss245x 7 лет назад
Your video did not show what happened when the dialog box displayed. Are you assuming the user clicks the OK button to infect or would clicking on the red X to close the dialog do the same thing? How can this vulnerability be tested? I assume such vulnerabilities are handled by most firewall software out there would that be safe to say?
@VectraAI
@VectraAI 2 года назад
At the minute 4:40, you see an example of an interaction from a user perspective. No matter what you select (OK or the Red Cross) you would end up being infected. What is interesting with this exploit is that the user does not have to interact to be hacked. As soon as you try to connect to the printer, the windows machine is owned, no matter what the user is answering.