Download PDF
Vectra AI Inc. > Case Studies > Vectra AI Review
Vectra AI Inc. Logo

Vectra AI Review

Technology Category
  • Analytics & Modeling - Big Data Analytics
  • Analytics & Modeling - Machine Learning
Applicable Industries
  • Education
Applicable Functions
  • Discrete Manufacturing
  • Quality Assurance
Use Cases
  • Cybersecurity
  • Predictive Maintenance
Services
  • Data Science Services
The Challenge
The university was looking for a solution that required less customization and more commercial off-the-shelf capabilities. They wanted their team to focus on protecting the university rather than upgrading custom software. They needed a solution that could inspect and look for malicious, abusive, or other types of forbidden behavior with their north-south and east-west traffic. The solution needed to be able to differentiate between normal and abnormal events. The university also wanted to detect issues with privileged accounts, as they had users ranging from low-privileged, regular users to administrators with high levels of privilege.
About The Customer
The customer is a university with an active user base of 50,000 to 60,000 people. They have hundreds of thousands of people in their directory, including alumni and adjunct faculty. The university has around 700 servers and hundreds of applications. They are not a huge institution, but they are not small either. They have a significant amount of traffic that they need to inspect, and they were previously using open source monitoring tools. However, these tools required a lot of work to maintain and leverage.
The Solution
The university chose to implement Vectra AI because it required less customization and was more of a commercial off-the-shelf solution. Vectra AI uses network artificial intelligence and machine learning to inspect traffic and look for malicious, abusive, or other types of forbidden behavior. It also provides Privileged Account Analytics for detecting issues with privileged accounts. The solution captures network metadata at scale and enriches it with security information, providing context upfront which helps the university prioritize. The solution also provides visibility into behaviors across the full lifecycle of an attack in the network, beyond just the Internet gateway. This makes the university's security operations much more effective.
Operational Impact
  • The solution has reduced the type of analysis needed to run down and get to the bottom of what's really happening.
  • The solution has helped move approximately 25 percent of the work from the Tier 2 to Tier 1 analysts.
  • The solution has made the work more efficient and the university can do a lot more to protect because they're able to react and look at what's important.
Quantitative Benefit
  • The solution has reduced the time it takes the university to respond to attacks by approximately 20 percent.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.