Vectra AI partners with Microsoft on zero trust security framework

Randy Schirman of Vectra

Vectra AI, a provider of threat detection and response, announced that the Vectra Cognito platform delivers key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers.

Vectra is positioned as an integral part of the Microsoft Zero Trust model; it assumes breaches by investigating the behaviour of users, workloads, networks and devices as though they originate from an untrusted network. It does so by leveraging its analytics and understanding of users and accounts, tracking them between on-premises and cloud.

Since cloud applications and mobile workforces have redefined the security perimeter and corporate resources and services now often bypass the network, perimeter-based security models that rely on network firewalls and VPNs have become obsolete.

To address this, Microsoft developed the Zero Trust Maturity Model to help customers adapt to the complexities of modern environments. By integrating the Vectra Cognito platform, customers will have access to AI-powered threat detection that monitors and verifies the communications to their business-critical applications.

“The Vectra Cognito platform was developed on the idea that standard static security measures like firewalls, NAC, and VPNs were not enough to protect the modern enterprise,” says, Randy Schirman, Vectra VP of partnerships. “With the hybrid remote work model effectively rendering traditional security measures obsolete, we are completely aligned with the Microsoft Zero Trust Model approach.”

The Vectra Cognito Platform uses AI to efficiently find and prioritise hidden attacks in real-time inside Microsoft 365, Azure Active Directory (AD), cloud, data centre, IoT, and enterprise networks before attackers cause irreparable harm to the organisation. The platform allows security teams to prevent attacks earlier in the kill chain, ensuring that applications essential to business continuity are available and accessible for the entire extended workforce. Vectra will help deliver visibility and analytics on the Zero Trust framework’s three guiding principles:

  1. Verify explicitly. Always authenticate and authorise based on all available data points, including user identity, location, device health, service or workload, data classification and anomalies.
  2. Use least privileged access. Limit user access with Just-in-Time and Just-Enough (JIT/JEA), risk-based adaptive polices, data protection to protect both data based adaptive polices and data protection to protect both data and productivity.
  3. Assume breach. Minimise blast radius for breaches and prevent lateral movement by segmenting access by network, user, devices and application awareness. Verify that all sessions are encrypted end to end. Use analytics to get visibility, drive threat detection and improve defences.

“Threat detection and response that accurately detects network anomalies and account takeover by monitoring user and machine behaviour is a core capability for Zero Trust,” says, Desmond Forbes, senior director of business development at Microsoft. “Vectra provides customers with visibility into their hybrid cloud environments, the accounts used and integrates that information with Microsoft Defender for Endpoint and Azure Sentinel to meet our joint customers’ Zero Trust objectives.”

To learn more about this integration, please visit here or read our companion blog.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more