Download PDF
Vectra AI Inc. > Case Studies > The new science of threat detection
Vectra AI Inc. Logo

The new science of threat detection

Technology Category
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • Finance & Insurance
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cybersecurity Services
The Challenge
The financial markets are a favorite target of cyberattackers, whether they are trying to disrupt the global economy, make a political statement or commit an act of war. From the banks to dealers, clearing houses to exchanges, the industry strives to maintain the availability and integrity of the financial infrastructure. It’s a massive challenge, where one worker’s misstep or moment of inattention can lead to compromised systems, financial loss and damage to corporate reputation. This exchange is well prepared to defend against the everyday cybercrimes of monetary gain and reputational damage as well as black swan events. To stay ahead of bad actors and criminals, it continually improves its information security controls and systems.
About The Customer
The customer is a leading securities exchange in the financial services industry. The exchange is well prepared to defend against everyday cybercrimes of monetary gain and reputational damage as well as black swan events. To stay ahead of bad actors and criminals, it continually improves its information security controls and systems. The exchange is committed to maintaining the availability and integrity of the financial infrastructure, a massive challenge where one worker's misstep or moment of inattention can lead to compromised systems, financial loss, and damage to corporate reputation.
The Solution
The exchange recently added the Cognito® network detection and response platform from Vectra® to its defenses. Cognito provides malware detection and real-time insights into advanced persistent attacks on the network. Cognito detects any phase of an ongoing cyberattack as it happens and describes what the attacker is doing. Cognito machine learning adapts as attacks evolve and anticipates the attackers’ next move in real time so it can be stopped. Cognito listens to users’ traffic to and from the Internet and the data center to identify anomalous behavior. Cognito learns the typical behaviors on the network and correlates anomalous behaviors that it has seen hours, days or even weeks before.
Operational Impact
  • Cognito helped the exchange identify a misconfiguration with its Kerberos authentication systems. It turned out that a weak encryption algorithm was being used and the situation was promptly remedied.
  • Cognito is also playing a role in helping the exchange meet its regulatory and audit requirements. Regulatory oversight is greater and greater, and the exchange has to prove that a control is working. Cognito gives the exchange transparency so it can find control weaknesses and remediate them quickly.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.