Search
Close this search box.
Search
Close this search box.
vectra

The Cognito platform

Detects attackers in real time and enriches threat investigations with a conclusive chain of evidence

Intelligent, AI-driven threat detection and response for cloud, SaaS, and on-prem footprints

Designed by an award-winning team of data scientists and threat researchers, the Cognito platform represents the rich, security-enriched data output of a holistic approach to security – capturing network metadata at scale, enriching it with machine learning-derived security information and flexibly applying it across Cognito products.

Vectra Cognito platform

The right data with the right context

icon-vectra-stream

Cognito Stream

Consume metadata where and how you want to

icon-vectra-recall

Cognito Recall

Use their custom prebuilt SaaS app to investigate and hunt

icon-vectra-detect

Cognito Detect

AI-based detections on top of network data

vectra-stream-recal-detect-border-dots
Vectra Platform

Cognito Platform

The Cognito platform collects and stores the right network metadata and enriches it with machine learning.

Cognito Stream

Deliver scalable, security-enriched network metadata to feed custom detection and response tools

  • Actionable network data in Zeek format
  • Embedded with data science-derived security Insights
  • Associates network metadata with unique host attributes

Cognito Recall

AI-assisted threat hunting – from cloud and data center workloads to the enterprise

  • Custom-engineered investigative workbench optimized for Vectra metadata – delivering sub second searches at scale
  • Collect and store rich network metadata, relevant logs and cloud events in real-time
  • Perform retrospective threat hunting using security-enriched network metadata
  • Dive deep into incidents triggered by security tools to identify other host devices, accounts and attackers involved in an incident

Cognito Detect

The power of AI to detect and prioritize in-progress attacks in real-time

  • Automate manual processes and consolidate thousands of events and historical context to pinpoint hosts that pose the biggest threat
  • Enable automatic and manual enforcement directly from the Vectra platform or take action through existing security investments like orchestration, EDR and NAC solutions
  • High-fidelity visibility into attacker behaviors across all public clouds, SaaS apps, private data centers and enterprise environments
  • Unique context eliminates the endless hunt-and-search for threats and enables immediate action

Request a Demo

Fill out the form below or call us 805-879-4800 to speak with a Tempest specialist.