
Overview

Product video
Vectra AI's Detect for AWS identifies attacks across your global AWS IaaS and PaaS footprint early to stop misconfiguration, credential theft and supply chain compromise from turning into breaches.
Detect for AWS leverages security-led AI to identify attacker behavior across the kill-chain covering different AWS services across regions and accounts. By converging these alerts into a single, prioritized dashboard along with investigative data, Detect for AWS enables SecOps to investigate and respond to attacks efficiently.
Detect for AWS is delivered as SaaS and analyzes AWS' rich native logging services like AWS CloudTrail.
To learn more, visit https://www.vectra.ai/products/detect-aws
Analysis of 100 GB of logs is included in the base price. Any additional volume will be charged as overage. Please contact our sales team by emailing AWS-marketplace@vectra.ai for a custom quote or any additional information.
Highlights
- Easy to deploy: an agentless, cloud-native solution to help DevSecOps counter new adversaries in an ever-changing, web-scale cloud footprint.
- Broad & deep coverage: AI-assisted portfolio of detections to cover advanced attacker tactics across AWS regions, accounts and services.
- Immediately actionable: attribution, prioritization and integrated investigation.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Trust Center
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Detect for AWS | Detect for AWS base package includes first 500GB of activity logs | $30,000.00 |
The following dimensions are not included in the contract terms, which will be charged based on your usage.
Dimension | Cost/GB |
|---|---|
Detect for AWS Overage - per 1GB analyzed | $60.00 |
Vendor refund policy
All Orders are non-cancellable and all fees and other amounts you pay under this Agreement are non-refundable.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Please contact https://www.vectra.ai/support or +1 (408) 326-2022 or +41 (44) 551 0143 for GmbH support@vectra.ai
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products


Customer reviews
Vectra AI: Fast, Insightful Threat Detection with Strong M365 and Azure AD Integration
Our security analysts use Vectra AI to go through detections of anomalies in our environment. Easily integrated with M365 and Azure AD.
We were able to quickly identify and prevent data leakage by investigating a suspicious M365 mail forwarding detection by Vectra AI. Other M365 detections we observed included risky Exchange Operations, Phishing simulation configuration change, Suspect eDiscovery Usage, Malicious links sent by external Teams user, and many more.
Detections that helped our SOC team prevent a major cyber incident was Azure AD Admin account creation, Login attempts from a disabled account, Azure AD TOR activity, Azure AD Suspicious device registration, among others.
A great feature is the AI intelligence as well as the Vectra AI Post-Quantum Cryptography Readiness dashboard. Quantum computing threatens today's public-key cryptography, putting SSH and TLS key exchanges at risk of future decryption. This Vectra AI dashboard highlights hosts and daily SSH connections still relying on non-PQC key exchange, helping us identify exposure and prioritize migration to quantum-resistant algorithms.
The interface loads fast and offers clear visualization allowing our SOC analysts to explore our environment to uncover emerging threats.
When assistance was needed, we received fast and professional support from the vendor.
Cost may be a limitation for some, however, for us being a large company with permissive budget, it was a good investment for the value it brought.