Vectra Networks to Demonstrate Real-Time Detection of In-Progress Cyber Attacks
Vectra Networks, the leader in real-time detection of in-progress cyber-attacks, today announced that its customer Jackson Health System has been selected to speak at the Gartner Symposium/ITxpo 2015 event next week. Jackson Health System CISO Connie Barrera will present “Protecting Health Organizations from Cyber Attacks” on Oct. 6 at 3:50 p.m. EDT in the Europe 8 Conference Room of the Walt Disney World Dolphin hotel in Orlando, Florida.
During the session, Barrera will discuss how recent innovations in Automated Threat Management provide a strong complement to firewalls, IDS/IPS and other prevention-based security systems. Automated Threat Management strengthens the security posture of regulated organizations and dramatically reduces risks associated with active cyber attacks that evade prevention security. In real time, Automated Threat Management detects attacks in progress inside networks and enables security teams to quickly prevent or mitigate loss before attackers can steal and inflict damage.
Vectra will also provide a live demonstration of its differentiated solution that delivers real-time detection of cyber attacks in-progress in Booth No. 1123 at Gartner Symposium/ITxpo 2015 next week. The Vectra solution uniquely extends automated real-time cybersecurity into all corners of an organization’s network – from the campus to remote sites and internal network segments.
“Gartner Symposium is an event that CIOs and CISOs use to learn about the most innovation solution providers to address strategic business initiatives and define their strategic initiatives,” said Mike Banic, vice president of marketing at Vectra. “It’s the perfect venue for Gartner clients to experience how Vectra uses data science and machine learning to automatically identify all phases of an active attack to manage Vectra delivers a new class of advanced persistent threat (APT) defense delivering real-time detection and analysis of active network breaches. Its technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet-bound network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within a network.