Next-Generation Technologies & Secure Development , Threat Hunting

Case Study: The Very Group's Digital Security Journey

UK Retailer Uses Vectra AI to Automate Threat Detection and Response
Michael Duncan, Cyber Security Analyst, The Very Group; Hitesh Sheth, President and CEO, Vectra AI

Once a catalogue merchant, The Very Group is now one of the UK’s largest digital retailers. And with transformation came significant cybersecurity challenges. Michael Duncan of The Very Group and Hitesh Sheth, CEO of Vectra AI, discuss the path to automated threat detection and response.

In an interview with Michael and Hitesh discuss:

  • The Very Group’s challenge detecting and mitigating threats;
  • How visibility and response have improved;
  • Advice to security leaders facing similar challenges.

Michael is a cyber security analyst for The Very Group and has been with the company for over 15 years in a variety of different roles. He started out in the mail room before moving to the call centre and from there moved into a systems and services role. He then moved into IT in a QA function and then evolved to IT service operations where he was responsible for VIP support, level 3 helpdesk escalations. In January of 2020, he joined the cyber security team.

Hitesh is the President and CEO of Vectra AI. Previously, he held the position of chief operating officer at Aruba Networks. Hitesh joined Aruba from Juniper Networks, where he was EVP/GM for its switching business and before that, SVP for the Service Layer Technologies group, which included security. Prior to Juniper, Hitesh held a number of senior management positions at Cisco.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.