

The integration of Cognito® Detect from Vectra® with VMware Carbon Black Cloud™ Endpoint enables security teams to automate the detection of hidden cyber attackers in real time, while unifying network and endpoint context to quickly verify and isolate advanced threats in the enterprise.
Together, Cognito Detect and Carbon Black Cloud Endpoint solve the most persistent security problems facing enterprise organizations today: Finding and stopping active cyber attacks while getting the most out of limited time and manpower of IT security teams.
Modern cyber attackers can easily evade prevention security defenses at the network perimeter. Unable to rely solely on prevention defenses, security teams must manually investigate threats and sift through the noise in search of a weak signal.
In practice, this often means that cyberattacks are first detected and reported by an external third party, turning their discovery into a post-breach forensic drill rather than a proactive attack mitigation exercise.
Cognito Detect from Vectra automates the detection of hidden cyberthreats by continuously analyzing all network traffic – from cloud and data center workloads to user and IoT devices – to detect the earliest signs of attacker behaviors.
In addition to automatically correlating detected threats with host devices that are under attack, Cognito Detect provides unique context about what attackers are doing and prioritizes threats that pose the biggest risk. This enables security teams to quickly focus their time and resources on preventing or mitigating loss.
Using artificial intelligence, Cognito Detect combines data science, machine learning and behavioral analytics to reveal the attack behaviors without signatures or reputation lists. Cognito Detect even exposes threats in encrypted traffic without using decryption.
When a threat is detected, Cognito Detect and CB Cloud Endpoint provide security teams with instant access to additional information for verification and investigation. Host identifiers and other hose device data from VMware CarbonBlack are automatically shown in the Cognito Detect UI.
Next, a single click allows security teams to easily pivot between the Cognito Detect UI and the CB Cloud Endpoint UI for the same host device or to securely connect directly to the host device using the CB Cloud Endpoint LiveResponse capability.
CB Cloud Endpoint easily reveals traits and behaviors of a threat that are only visible inside the host device, while CB Cloud does the same for cloud workloads. This enables security teams to quickly and conclusively verify a cyberthreat while also learning more about how the threat behaves on the host device – or in the cloud – itself.
In addition to reducing the time to investigate threats, Cognito Detect andCB Cloud Endpoint let security teams take swift, decisive action. Armed with network and endpoint context, security teams can quickly isolate compromised host devices from the network to halt cyberattacks and avoid data loss.
The Host Lockdown feature enables the Vectra Cognito platform to automatically disable hosts that demonstrate suspicious activity at the endpoint or through cloud apps. If analysts need to take matters into their own hands, they have the option to manually disable hosts during a security investigation. Disabling a host will significantly slow down an active attack by limiting an attacker’s access to additional resources. This drastically curtails the attack’s reach and gives theSecurity Operations Center (SOC) more time to investigate and remediate attacks.
Host Lockdown ensures that automation causes as little disruption as possible while giving you greater confidence that attackers are stopped in their tracks.
As a leader in network detection and response (NDR), Vectra® AI protects your data, systems and infrastructure. Vectra AI enables your SOC team to quickly discover and respond to would-be attackers —before they act.
Vectra AI rapidly identifies suspicious behavior and activity on your extended network, whether on-premises or in the cloud. Vectra will find it, flag it, and alert security personnel so they can respond immediately.
Vectra AI is Security that thinks®. It uses artificial intelligence to improve detection and response over time, eliminating false positives so you can focus on real threats.
VMware Carbon Black has designed the most complete next-gen endpoint security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The VMware CarbonBlack Cloud™ Endpoint Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats.
Altyapınıza tam görünürlük sağlayan tek siber güvenlik platformu.

hibrit bulut için yapay zeka destekli algılama ile
NDR için 2025 Gartner® Magic Quadrant™ 'ta Lider
36
Yapay zeka patentleri
150+
Yapay zeka modelleri
12
MITRE referansları

AWS hizmetleri yapılandırmaları korur, erişimi kontrol eder ve etkinliği izler. Ancak gelişmiş saldırganlar kimlik doğrulama sonrası kör noktalardan nasıl yararlanacaklarını bilirler. Ve bunları IAM rollerini taviz vermek, hesaplar arasında yanal hareket etmek ve veri sızdırmak için kullanırlar.
VectraVectra AI , sizi sektörün AWS için özel olarak tasarlanmış tek yapay zeka odaklı bulut algılama ve yanıt çözümü ile donatır. AWS üzerinde yerel olarak çalışır ve Amazon GuardDuty, AWS CloudTrail, AWS Security Lake ve AWS Bedrock gibi hizmetlerle sorunsuz bir şekilde entegre olur. Böylece gelişmiş hibrit ve çoklu bulut saldırılarını büyümeden durdurabilirsiniz.

Vectra AI ve AWS birlikte kimlik doğrulama sonrası açığı kapatıyor.
Kimlik doğrulamadan sonra IAM kötüye kullanımını, yanal hareketi ve veri sızıntısını tespit edin
Normal AWS faaliyetlerine karışan gizli saldırgan davranışlarını tespit edin
Tespitleri VPC'ler, bölgeler ve kimlikler arasında ilişkilendirin
Tek bir görünüm için AWS'ye özgü bulguları ağ ve kimlik sinyalleriyle birleştirin
Zengin meta veri, varlık ilişkilendirme ve yapay zeka odaklı önceliklendirme ile incelemeleri %50 daha hızlı hale getirin
52 daha fazla potansiyel tehdit belirleme
Vectra AI Platformu, tehditleri yayılmadan önce durdurmak için bulut, ağ ve kimlik genelinde davranışları tespit eder ve ilişkilendirir.
Günlük 13,3 milyon IP'yi izler
Saatte 10 milyar oturum işler
Saniyede 9,4 trilyon bit işleyebilir


MITRE ATT&CK tekniklerinin >%90'ını kapsar
Vectra AI yı en çok referans verilen MITRE D3FEND üretici yapar
Bulut, ağ ve kimlik genelinde yapay zeka odaklı tespitlerle, ek karmaşıklık olmadan tam görünürlük ve daha hızlı incelemeler elde edersiniz.





Vectra AI , kimlik doğrulamasından sonra ortaya çıkan saldırgan davranışlarını tespit ederek AWS bulgularını ağ ve kimlik etkinliklerinden elde edilen bağlamla zenginleştirir.
Hayır. Vectra AI , yerel araçların tek başına gözden kaçırabileceği aktif saldırgan davranışlarını tespit ederek AWS hizmetlerini tamamlar.
Vectra AI , gelişmiş bulut saldırılarına karşı kapsam, netlik ve kontrol sağlamak için Amazon GuardDuty, AWS CloudTrail, AWS Security Lake ve AWS Bedrock gibi hizmetlerle sorunsuz bir şekilde entegre olur ve tüm bunları operasyonel ek yük getirmeden yapar.
Vectra AI , birleşik görünürlük için AWS iş yükleri, IAM, SaaS, şirket içi ve hibrit bulut genelinde algılamayı genişletir. AWS entegrasyonlarımız hakkında daha fazla bilgi için: https://support.vectra.ai/vectra/knowledge
AWS ortamınızdaki gizli tehditleri tespit edin, gürültüyü azaltın ve araştırmaları hızlandırın.

Stop attacks across encrypted channels, private access, and hybrid environments
NDR için 2025 Gartner® Magic Quadrant™ 'ta Lider
36
Yapay zeka patentleri
150+
Yapay zeka modelleri
12
MITRE referansları

Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) provide the essential SASE architecture you need for secure remote and hybrid work. But attackers still find blind spots. And they’ll use them to slip past prevention controls, remaining invisible to SASE alone.
The Vectra AI Platform ingests Zscaler traffic to detect hidden attacker behaviors across internet, private access, cloud, and IoT/OT. The result is complete visibility and faster investigations — without added complexity.

Together, Vectra AI and Zscaler bridge the gap between detection and protection for complete coverage across SASE environments.
Detect evasive C2 and exfiltration attempts that slip past prevention controls.
Spend 37% less time identifying new attack use cases
52 daha fazla potansiyel tehdit belirleme
Correlate detections across cloud, on-premises, remote, and IoT/OT traffic for complete visibility.
Unify visibility across hybrid environments into a single centralized solution
Increase security team efficiency by 40%
Enrich Zscaler telemetry with AI-driven context, streamlining SOC triage and threat hunting.
Cut triage time by 60% with AI-driven context
Cut manual investigation tasks by 50%
Legacy solutions prevent and control access, but advanced attackers still find ways in. The Vectra AI Platform sees and stops hidden attacks as they progress from network to identity to cloud.
Günlük 13,3 milyon IP'yi izler
Saatte 10 milyar oturum işler
Saniyede 9,4 trilyon bit işleyebilir


MITRE ATT&CK tekniklerinin >%90'ını kapsar
Vectra AI yı en çok referans verilen MITRE D3FEND üretici yapar
Correlate signals across SASE, cloud, identity, and IoT to expose multi-vector hybrid attacks before they spread.





By ingesting traffic from Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) , Vectra AI provides detection of hidden attacker behaviors across all users, workloads, and devices. This gives SOC teams the visibility they need to enforce zero trust policies with confidence.
Integrating the Vectra AI Platform with ZIA and ZPA allows your security team to identify evasive command-and-control, lateral movement, reconnaissance, and data exfiltration attempts that traditional legacy solutions and NGFW controls frequently miss.
No. The integration leverages existing ZIA and ZPA traffic flows, enriching telemetry with AI-driven detection to simplify, not burden, SOC workflows.
The integration covers cloud, on-premises, remote work, and IoT/OT environments, ensuring end-to-end visibility across the enterprise attack surface.
Strengthen zero trust with AI-driven detection, investigation, and response.