Listing Thumbnail

    Vectra Cognito for Service Delivery Partners (Billed Monthly)

     Info
    Sold by: Vectra AI 
    Vectra Threat Detection and Response for Partner Provided Consulting Engagements
    Listing Thumbnail

    Vectra Cognito for Service Delivery Partners (Billed Monthly)

     Info
    Sold by: Vectra AI 

    Overview

    Vectra Cognito is an AI-driven cloud and network detection & response (NDR) platform that provides the fastest and most efficient way to prioritize and stop attacks across cloud and data center applications and workloads, as well as user & IoT devices and accounts.

    The Cognito® platform accelerates threat detection, investigation, and response using AI to enrich cloud logs and network metadata.

    • Cognito Detect™ provides the fastest most efficient way to prioritize and stop attacks across cloud, data center, applications, and workloads, as well as user & IoT devices and accounts

    • Cognito Detect for Office365 and Azure AD™ finds and stops attacks in enterprise SaaS applications and the Microsoft 365 Ecosystem

    • Cognito Stream™ sends security-enriched metadata to data lakes and SIEMs in Zeek-format

    • Cognito Recall™ is a cloud-based application that stores and investigates threats in enriched metadata

    Vectra Cognito integrates with AWS virtual private cloud (VPC) traffic mirroring to monitor all infrastructure-as-a-service traffic. Cognito also integrates with AWS Security Hub to publish Vectra detections as findings in Security Hub, enabling you to correlate Vectra attacker detections with other data sources for faster threat hunting and incident investigations.

    For questions on how Vectra AI will work within your environment, please contact: aws-marketplace@vectra.ai 

    Highlights

    • AI-driven threat hunting with Highest-fidelity data source. AI-enriched network metadata. Deep protocol visibility, not just connectivity attributes
    • Vectra Cognito Detect is the only solution that can track and link cloud identity with on premises hosts to stop ransomware originating in one
    • Deep integration with AWS Services (Traffic Mirroring, Cloudtrail, VPC Flowlogs), EPP Vendors (Crowdstike, Defender, SentinelOne), SIEMs (Splunk, Sentinel, ArcSight) and other services (zScaler, ServiceNow, PaloAlto, VMWare)

    Details

    Categories

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Vectra Cognito for Service Delivery Partners (Billed Monthly)

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for any usage exceeds the entitle amount or not covered in the contract. These charges will be applied on top of the contract price. If you choose not to renew or replace your contract before it ends, access to your entitlements will expire.

    1-month contract (2)

     Info
    Dimension
    Description
    Cost/month
    Detect for PPC
    Platform for Partner Provided Consulting - billed monthly
    $15,000.00
    O365 for PPC
    Detect for O365 - Partner Provided Consulting - billed monthly
    $60.00

    Additional usage costs (1)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Cognito Platform for Partner Provided Consulting - Platform Overages
    $1.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    support@vectra.ai  https://www.vectra.ai/support  or call us at (408) 326-2022 (US)

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    18 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Paul D.

    Team Manager, Enterprise Information Security

    Reviewed on Sep 17, 2020
    Review provided by G2
    What do you like best about the product?
    Ease of deployment, intuitive UI, and easy to work with sales and support staff.
    What do you dislike about the product?
    Reporting is lacking, currently only one report available with different timelines, also no ability to export from the console.
    What problems is the product solving and how is that benefiting you?
    Visibility of network traffic, analysis of network traffic, and baselining.
    Joel V.

    Easy to deploy and works great at finding evil.

    Reviewed on Sep 11, 2020
    Review provided by G2
    What do you like best about the product?
    Vectra finds what other controls miss. It is used to help with network visibility and integrates great with Splunk. We have passed every pen test since Vectra was deployed. The company has really listened to the customers and made big improvements over the last three years.
    What do you dislike about the product?
    It can get expensive if you have a lot of offices. The appliances are not cheap so if you have a bunch of smaller offices it can start to add up.
    What problems is the product solving and how is that benefiting you?
    Network visibility in east-west traffic is our primary use. Because we ingest the data in Splunk it is also used to evaluate incidents and help make decisions on incident prioritization.
    Recommendations to others considering the product:
    Vectra helps IR teams with prioritizing events. It can take some time to get everything reporting correctly so use the Vectra resources to help create the rules and whitelisting events is recommended.
    Information Technology and Services

    Unbeaten speed of innovation

    Reviewed on Aug 27, 2020
    Review provided by G2
    What do you like best about the product?
    Vectra does what it says on the tin, but goes beyond in providing a constant. speed of innovation that means they are constantly releasing new features. and detections, helping us to keep up to speed with any threats on our network
    What do you dislike about the product?
    As with any security tool, the alerts! But thankfully by monitoring the. quadrant based approach serious issues boil up for quick investigation.
    What problems is the product solving and how is that benefiting you?
    East-west visibility and identification of dark/unknown IT
    Financial Services

    Vectra AI Review

    Reviewed on Jul 07, 2019
    Review provided by G2
    What do you like best about the product?
    This is a high quality anomaly detection tool, very easy to understand and it helps very nicely to get reports, PCaps, and lets you see in an easy way what is happening in the network, this has top of the line algorithms, I simply love this product.
    What do you dislike about the product?
    Is very long process to tweak it to the point that it works perfect, but once that is done this is a beast
    What problems is the product solving and how is that benefiting you?
    Monitoring the network for cyberattacks
    Recommendations to others considering the product:
    This is an awesome tool for recognizing cyberattacks in real time
    Sandy S.

    "A good threat tool"

    Reviewed on Jun 29, 2019
    Review provided by G2
    What do you like best about the product?
    Generally excellent instrument to identify and stay away from digital assaults utilizing man-made consciousness progressively. Interestingly, the device advances as the strategies of digital assaults advance gratitude to the way that it depends on a man-made brainpower that is found out and improved after some time. It permits to discover digital assaults and dangers in the cloud, server farm and in business situations.
    What do you dislike about the product?
    Need all around data of the instrument to recognize possible security perils. This puts aside chance to end up acquainted with the product.I severely dislike about this is you need a minium of knowleadge about you see beacuse its overflowing with therms without information
    What problems is the product solving and how is that benefiting you?
    The eventual fate of security needs to settle on choices for people, however help people settle on choices all the more rapidly. This innovation is genuinely a power multiplier in an industry that is suffocating in information that necessities to drive choices.
    Recommendations to others considering the product:
    At present I would state that it is the best stage to distinguish, forestall and anticipate cyberattack dangers. My organization is one of the biggest banks on the planet and has depended on this instrument, after a long investigation by the IT specialists of the organization.
    View all reviews