Broad coverage across the entire Attacker Kill Chain in Office 365
Vectra Detect for Office 365 ingests activity logs from multiple services like O365, Azure AD, SharePoint/OneDrive and Exchange. The Vectra AI has a deep understanding of Office 365 application semantics and leverages supervised and unsupervised Machine Learning models. By analysing events like logins, file creation/manipulation, DLP configuration, and mailbox routing configuration & automation changes, it accurately finds attacker behaviour patterns across the entire Attacker Kill Chain. The result is high precision actionable detections instead of anomaly alerts that accurately expose even novel and never before seen attackers with high confidence. The detections are correlated to accounts which provides the security team the prioritisation and narrative to act quickly.
How it works
As the industry’s first network detection and response solution for the cloud, Vectra Detect for Office 365 extends the proven platform that currently protects public clouds, private data centers, and enterprise environments to Microsoft Office 365. The award-winning approach leverages security research combined with data science to create an AI that understands real attacker behaviors and account privilege abuse in Office 365. By taking a cloud-native approach, Cognito Detect for Office 365 detects and stops known and unknown attacks before they lead to breaches, without relying on preventative security
Once an attacker has gained access to an Office 365 account, they can move around easily. New phishing attacks originating from the internal company domain, or shared files with malicious code have high success rates and lead to rapid spread in both Office 365 and onto endpoints. The Vectra Cognito platforms’ enterprise-wide coverage allows organizations to regain visibility across their entire infrastructure, from cloud to ground. As attacks progress and move between endpoints and Office 365, Vectra enables security operations teams to stay ahead and respond faster with a full context of the threats.