Don’t do it: Rolling your own production Zeek deployment

Posted by Rohan Chitradurga on May 17, 2019 4:42:37 PM

In a previous blog, we wrote about the benefits that come with Zeek-formatted metadata. This blog builds on that thread by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.

Read More »

Topics: "Security operations"

Three cornerstones of the SOC visibility triad

Posted by Kevin Sheu on May 7, 2019 4:38:45 PM

In the Gartner research report “Applying Network-Centric Approaches for Threat Detection and Response” published March 18, 2019 (ID: G00373460), Augusto Barros, Anton Chuvakin, and Anna Belak introduced the concept of the SOC Visibility Triad.

Read More »

Topics: "Security operations"

Subscribe to the Vectra Blog

Recent Posts

Posts by Topic

Follow us