
Overview
Stream enables the Vectra Platform to continuously send enriched network security metadata from a VPC deployment to a private data-lake, where it can be analyzed by security researchers and SOC professionals. Please Note - Vectra Stream requires an operational Vectra install.
Highlights
- Vectra is transforming cybersecurity with AI. Its Cognito platform provides network detection and response in real time while empowering threat hunters to perform highly efficient incident investigations.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Trust Center
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Contact your Vectra sales representative
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Cognito Stream
Stream is a component of the Cognito Platform, required to use the Cognito Stream application. Stream is deployed in the customer's VPC. It receives network metadata from the Cognito Brain, converts it into a standard Bro / Zeek format and forwards it to the customer's data-lake.
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Version release notes
This release is for customers with existing Cognito Brain instances running version 9.6 and above. Please upgrade Brain instances to version 9.6 before continuing.
Additional details
Usage instructions
Verify your Cognito Brain is running version 9.6 or higher. Retrieve the IP Address of your Cognito Brain and the Sensor Registration Token from the Settings page under the Sensor section. Deploy Cognito Stream from AWS Marketplace, and provide the IP address of the Cognito Brain and the Sensor Registration token. The Stream instance's mgtSubnet needs access to ports 22 and 443 on the Cognito Brain. After the instance launches, it will automatically attempt to pair with the Brain IP provided. Log in to the Cognito Brain, browse to Settings page and select the Cognito Stream tab. Check the status and configure the destination for the metadata of the Stream instance. See the "Resources" section in the Cognito Brain UI for a copy of the complete setup documentation.
Resources
Vendor resources
Support
Vendor support
Login, email or call us 24/7
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products



Customer reviews
Vectra AI: Fast, Insightful Threat Detection with Strong M365 and Azure AD Integration
Our security analysts use Vectra AI to go through detections of anomalies in our environment. Easily integrated with M365 and Azure AD.
We were able to quickly identify and prevent data leakage by investigating a suspicious M365 mail forwarding detection by Vectra AI. Other M365 detections we observed included risky Exchange Operations, Phishing simulation configuration change, Suspect eDiscovery Usage, Malicious links sent by external Teams user, and many more.
Detections that helped our SOC team prevent a major cyber incident was Azure AD Admin account creation, Login attempts from a disabled account, Azure AD TOR activity, Azure AD Suspicious device registration, among others.
A great feature is the AI intelligence as well as the Vectra AI Post-Quantum Cryptography Readiness dashboard. Quantum computing threatens today's public-key cryptography, putting SSH and TLS key exchanges at risk of future decryption. This Vectra AI dashboard highlights hosts and daily SSH connections still relying on non-PQC key exchange, helping us identify exposure and prioritize migration to quantum-resistant algorithms.
The interface loads fast and offers clear visualization allowing our SOC analysts to explore our environment to uncover emerging threats.
When assistance was needed, we received fast and professional support from the vendor.
Cost may be a limitation for some, however, for us being a large company with permissive budget, it was a good investment for the value it brought.