Vectra acquires Siriux Security Technologies

Vectra AI announced the acquisition of Siriux Security Technologies, a leading provider of identity and software as a service (SaaS) posture management. The acquisition positions Vectra as the only vendor that enables customers to securely configure and detect active threats in cloud identity and SaaS applications, including Microsoft Azure AD and Microsoft 365.

“We have helped customers stop the gamut of modern attacker campaigns—from ransomware to supply chain to nation-state attacks like SolarWinds,” said Hitesh Sheth, President and CEO, Vectra AI. “SaaS applications have become a haven for cyberattacks and cloud identity is the way in. Through the combined expertise of the teams at Vectra and Siriux, we are now able to deliver the best protection for customers facing these threats.”

Vectra is known for its world-class AI-driven threat detection and response for hybrid and multi-cloud infrastructures, including public cloud, SaaS, network and identity. Siriux extends Vectra’s coverage even earlier in the threat lifecycle, providing a layer of analytics to assess complex identity and SaaS configurations—closing the loopholes that allow access to attackers.

Siriux’s industry-leading approach is based on four key principles: privilege management, attack surface reduction, service hardening and transitive trust management. Siriux analyzes the configuration of applications such as Microsoft Azure AD and M365 against these principles to deliver prioritized, practical recommendations to reduce the risk of a successful attack.

“Our solution ensures organizations have done everything possible to identify common attack paths in SaaS platforms and minimize the attack surface of their cloud identity and SaaS applications by following our recommendations,” said Aaron Turner, Founder and CEO, Siriux Security Technologies “By joining forces with Vectra, we are now able to enhance our solution with proven, AI-driven capability to detect and respond to rapidly evolving attack methods that can still circumvent even the best security posture.”