Download PDF
Vectra AI Inc. > Case Studies > Major real estate firm replaces IDS/IPS with AI-driven network detection and response
Vectra AI Inc. Logo

Major real estate firm replaces IDS/IPS with AI-driven network detection and response

Technology Category
  • Analytics & Modeling - Machine Learning
  • Cybersecurity & Privacy - Network Security
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cybersecurity Services
The Challenge
The security operations team of a major real estate firm realized the need to modernize their approach to potential cyber threats. The company had been using combined intrusion detection and intrusion prevention systems to catch threats at the network perimeter. However, these systems did not scale well and offered no visibility inside the network and data center. The security operations teams were also burdened with manually investigating thousands of threat alerts per day, causing significant alert fatigue and giving real attacks more time to spread.
About The Customer
The customer is a publicly traded real estate and relocation services firm in the United States, with a net worth of $5 billion. The company owns several widely known real estate brands, brokerages, relocation, and title services. To keep its operations running 24x7, the company has three major data centers and many dozens of offices across the country.
The Solution
The security team considered Vectra and Darktrace, and eventually chose the Cognito® Network Detection and Response platform from Vectra®. This platform uses AI-derived machine learning to automatically detect and respond to cyber attackers across cloud, data center, IT, and IoT networks. It enables security operations teams to perform conclusive incident investigations and AI-assisted threat hunting. The platform prioritizes in-progress attacks that pose the highest business risk, allowing the security operations team to focus its time and attention where it's most needed. Along with the Cognito NDR platform, the company uses Carbon Black for endpoint detection and response (EDR), a SIEM from Splunk, and Cybersponse for security orchestration, automation and response (SOAR).
Operational Impact
  • Real-time context and insights about threat behaviors
  • Significant reduction in the number of alerts from thousands a day to 2-3 alerts a day
  • Full scope of threat activity across their network
Quantitative Benefit
  • Reduction of alerts from thousands a day to 2-3 alerts a day

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.