Vectra AI Inc. Case Studies Online gaming company bets on Vectra and AWS for cyberattack detection and monitoring
Edit This Case Study Record
Vectra AI Inc. Logo

Online gaming company bets on Vectra and AWS for cyberattack detection and monitoring

Vectra AI Inc.
Cybersecurity & Privacy - Network Security
Infrastructure as a Service (IaaS) - Cloud Computing
Infrastructure as a Service (IaaS) - Virtual Private Cloud
Software
Business Operation
Cybersecurity
Cloud Planning, Design & Implementation Services
Cybersecurity Services
The online gaming company, with operations in more than a dozen locations worldwide, was facing a rapidly changing threat landscape. Gaming companies are lucrative targets for cybercriminals, who range from solo actors to organized crime rings. An outage or data breach can cause material damage to the firm’s income, customer retention and longterm value. As a publicly traded company, it is required to meet a wide range of regulatory and compliance mandates, including PCI-DSS and GDPR. The gaming firm needs to be able to detect threats and attacks, which means having the ability to hunt for malicious activity around the clock without requiring security teams to be on site 24/7. At the same time, security analysts were overwhelmed by the volume of alerts from their security tools, such as SIEMs, firewalls and other defenses. Before selecting Vectra’s AI-driven platform, the company experienced limited visibility into threat behaviors inside its networks, which did not support the company’s priorities to deliver the best experience for gamers, guard its operations against attacks, and protect its brands and intellectual property.
Read More
The customer is a popular online gaming operator based in North America with operations in more than a dozen locations around the globe. The company runs many of the most beloved sites and collections of brands in its sector. Due to its large audience, cybersecurity is paramount for the gaming community as cybercriminals view these sites as prime attack targets for their new wave of threats. The company is publicly traded and is required to meet a wide range of regulatory and compliance mandates, including PCI-DSS and GDPR. The company's priorities include delivering the best experience for gamers, guarding its operations against attacks, and protecting its brands and intellectual property.
Read More
The online gaming firm selected the Cognito® threat detection and response platform from Vectra® to detect complex, multistage attacks across cloud, data center, IoT, and enterprise networks. The Cognito platform from Vectra automatically identifies hidden cyberattacks and stops data breaches in hybrid and cloud deployments. With 360-degree visibility, the Cognito delivers a single view of all threat behaviors—across cloud, data center, IoT and enterprise networks, while providing invaluable security insights and context about attacks. The company relies on AWS for flexible, scalable workloads and any disruptions could seriously damage the online gaming firm’s reputation. Cognito automatically detects and responds to hidden cyberattack behaviors across the entire network. Cognito captures all network metadata at scale and enriches it with machine learning-derived security context, and reliably stores it in AWS for proactive threat hunting and conclusive incident investigations. Deep integration between Cognito and AWS allows the company to deploy Vectra sensors in AWS virtual private clouds (VPCs), which use traffic mirroring to extend AI-driven cyberattacker detection and response to AWS workloads. Integration with AWS Security Hub ensures that Cognito definitions are published as findings in Security Hub, where they can be correlated with other data sources for faster threat hunting and incident investigations in the cloud.
Read More
Integration between Cognito and AWS allows the company to deploy Vectra sensors in AWS virtual private clouds (VPCs)
Increased visibility into network threat behaviors
Cognito NDR definitions are published as findings in AWS Security Hub, where they can be correlated with other data sources for faster threat hunting and incident investigations in the cloud
Download PDF Version
test test