{"id":25177,"date":"2022-08-26T21:49:14","date_gmt":"2022-08-26T21:49:14","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25177"},"modified":"2022-09-02T22:33:15","modified_gmt":"2022-09-02T22:33:15","slug":"ndr-network-detection-response","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/","title":{"rendered":"Top Network Detection &#038; Response (NDR) Solutions"},"content":{"rendered":"\n<figure class=\"wp-block-image alignright size-large is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.NDR_.Profile-1024x683.jpg\" alt=\"A man stands in a dark room with light green computer projected on his face. Who is this man? What is their plan? This article is about the latest network security tools, known as network detection and response or NDR software using AI and ML for advanced security analytics and inside threat detection and response.\" class=\"wp-image-25179\" width=\"443\" height=\"296\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-1024x683.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-300x200.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-768x512.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-1536x1024.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-2048x1365.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-150x100.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-696x464.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-1068x712.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-1920x1280.jpg 1920w\" sizes=\"(max-width: 443px) 100vw, 443px\" \/><\/figure>\n\n\n\n<p>In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">XDR<\/a>.<\/p>\n\n\n\n<p>Whereas older solutions like antivirus, firewalls, and endpoint detection and response (<a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDR<\/a>) have long focused on threats at the network perimeter, the intent of NDR is to monitor and act on malicious <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">threats<\/a> within organization networks using artificial intelligence (<a href=\"https:\/\/www.esecurityplanet.com\/trends\/ai-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI<\/a>) and machine learning (<a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">ML<\/a>) analysis.<\/p>\n\n\n\n<p>Edward Snowden and the NSA breach of 2013, as well as dozens of other nightmares, point to the growing threat of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\" target=\"_blank\" rel=\"noreferrer noopener\">inside threats<\/a> for a universe of IT environments. Today, both outsiders with the right social engineering skills and disgruntled personnel pose risks to sensitive data when network architectures fail to implement <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-microsegmentation\/\" target=\"_blank\" rel=\"noreferrer noopener\">microsegmentation<\/a> and advanced network traffic analysis (NTA).<\/p>\n\n\n\n<p>This article looks at the top network detection and response solutions in the budding sector, what NDR is, and what to consider in a NDR solution.<\/p>\n\n\n\n<p>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\"><strong>Top Network Monitoring Tools<\/strong><\/a><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6c91b02d52\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6c91b02d52\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#Top-Network-Detection-and-Response-Solutions\" title=\"Top Network Detection and Response Solutions\">Top Network Detection and Response Solutions<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#Honorable-Mention-NDR-Solutions\" title=\"Honorable Mention NDR Solutions\">Honorable Mention NDR Solutions<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#What-is-Network-Detection-Response\" title=\"What is Network Detection &amp; Response?\">What is Network Detection &amp; Response?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#NDR-Features\" title=\"NDR Features\">NDR Features<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#Network-Security-and-NDR\" title=\"Network Security and NDR\">Network Security and NDR<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#How-to-Choose-a-NDR-Solution\" title=\"How to Choose a NDR Solution\">How to Choose a NDR Solution<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Top-Network-Detection-and-Response-Solutions\"><\/span>Top Network Detection and Response Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Bricata<\/li><li>Cisco<\/li><li>Darktrace<\/li><li>Exeon<\/li><li>Extrahop<\/li><li>Gigamon<\/li><li>Vectra<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Cisco_.NDR_.png\" alt=\"Cisco logo.\" class=\"wp-image-25186\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Cisco_.NDR_.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Cisco_.NDR_-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Cisco<\/h3>\n\n\n\n<p>Almost 40 years after its start in Silicon Valley, Cisco remains one of the top IT and cybersecurity solution providers in the world. The Cisco Secure portfolio is massive, including next-generation firewalls (<a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">NGFW<\/a>), <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">MFA<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability management<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/distributed-denial-of-service-ddos-protection-vendors\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS protection<\/a>. Alongside analytics solutions for cloud, malware, and logs, Cisco <a href=\"https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/a\/y2015\/m12\/cisco-completes-acquisition-of-lancope.html\" target=\"_blank\" rel=\"noreferrer noopener\">acquisition<\/a> of Lancope in 2015 led to the development of its NDR solution, Cisco Secure Network Analytics. Built to detect and act on network threats faster, Cisco SNA is deployable as a <a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud<\/a>-based service, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\" target=\"_blank\" rel=\"noreferrer noopener\">virtual machine<\/a>, or on-premises appliance.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Cisco Secure Network Analytics Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Detection for signature-less, insider, and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/90-percent-of-malware-comes-from-encrypted-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\">encrypted malware<\/a> threats.<\/li><li>Group-based policy adoption and reports to audit and visualize communications.<\/li><li>The AnyConnect Network Visibility Module (NVM) for endpoint telemetry data.<\/li><li>Malware analysis without decryption for advanced encrypted threats.<\/li><li>Integrations with Akamai, Exabeam, Google, LogRhythm, Radware, and Sumo Logic.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Darktrace.jpeg\" alt=\"Darktrace logo.\" class=\"wp-image-25185\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Darktrace.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Darktrace-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Darktrace<\/h3>\n\n\n\n<p>Celebrating a decade in 2023, Darktrace was one of the fastest growing <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity startups<\/a> with a more turbulent ride since its listing on the London Stock Exchange in 2019. The Darktrace stack of solutions covers <a href=\"https:\/\/www.esecurityplanet.com\/networks\/nsa-cisa-guidance-for-choosing-and-hardening-vpns\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardening<\/a>, detection, and response for hybrid IT environments, including the vendor\u2019s NDR solution, Darktrace DETECT, for applications, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\" target=\"_blank\" rel=\"noreferrer noopener\">email<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero trust<\/a>, operational technology (OT), and more. Today, the Cambridge, UK-based company puts artificial intelligence first in its security services for over 7,400 businesses in 110 countries.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Darktrace DETECT Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Self-learning AI to understand, secure, and optimize network interactions.<\/li><li>Analyze thousands of metrics for known and unknown malware techniques.<\/li><li>Integrations with AWS, Cisco, Fortinet, Microsoft, Okta, Rapid7, and ServiceNow.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.ExtraHop.png\" alt=\"ExtraHop logo.\" class=\"wp-image-25183\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.ExtraHop.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.ExtraHop-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">ExtraHop Networks<\/h3>\n\n\n\n<p>Launched in 2007, ExtraHop\u2019s success as a AI-based cybersecurity vendor led to its <a href=\"https:\/\/www.extrahop.com\/company\/press-releases\/2021\/extrahop-announces-completion-of-acquisition\/\" target=\"_blank\" rel=\"noreferrer noopener\">acquisition<\/a> in July 2021 by Bain Capital for $900 million. Hailing from Seattle, Washington, the ExtraHop Reveal(x) 360 offers a unified threat intelligence platform for hybrid and multi-cloud IT environments. ExtraHop\u2019s three core NDR solutions cover cloud security, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">network security<\/a>, and IT operations. Whether it\u2019s AWS, Google Cloud, or Azure, ExtraHop offers clients <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud-native security<\/a> and comprehensive visibility into cloud workloads.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">ExtraHop Reveal(x) Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Monitor sensitive data and workloads to prevent data breaches.<\/li><li>Detects lateral movement and <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">software supply chain attacks<\/a> and vulnerabilities.<\/li><li>Behavior and rule-based analytics to detect and respond to known and unknown threats.<\/li><li>Identify threats and unusual activity faster to respond and remediate vulnerabilities.<\/li><li>Integrations with Check Point, Citrix, CrowdStrike, IBM, Palo Alto Networks, and Splunk.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"201\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Vectra.png\" alt=\"Vectra logo.\" class=\"wp-image-25181\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Vectra.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Vectra-150x151.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Vectra AI<\/h3>\n\n\n\n<p>Started in 2012, Vectra already stands out among the NDR marketplace, offering managed detection and response (MDR) and its threat detection and response platform. The San Jose-based company solutions span attack surfaces for all major cloud services, <a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">data centers<\/a>, and Microsoft 365, with specialized threat management for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a>, supply chain attacks, data breaches, and account compromise. Companies have plenty of integrations to choose from for tools like EDR, SIEM, <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence<\/a>, and Secure Access Service Edge (<a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\" target=\"_blank\" rel=\"noreferrer noopener\">SASE<\/a>).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Vectra Threat Detection and Response Platform Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Capture public cloud, SaaS, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity<\/a>, network, and EDR data for analysis.<\/li><li>Multiple AI modeling techniques to audit network workloads.<\/li><li>Threat and risk prioritization to inform administrator action and investigation.<\/li><li>Automated and manual response options for securing networks in real-time.<\/li><li>Integration with AWS, Azure, Juniper, Pentera, SentinelOne, VMware, and Zscaler.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Bricata.png\" alt=\"Bricata logo.\" class=\"wp-image-25182\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Bricata.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Bricata-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Bricata<\/h3>\n\n\n\n<p>Launched in 2014, Bricata is another vendor specializing in NDR capabilities and successful enough to catch the attention of OpenText, who <a href=\"https:\/\/bricata.com\/news\/opentext-strengthens-security-protection-cloud-with-network-detection-response\/\" target=\"_blank\" rel=\"noreferrer noopener\">acquired<\/a> the Maryland based vendor in November 2021. While OpenText continues its acquisition spree (notably, <a href=\"https:\/\/www.reuters.com\/markets\/deals\/canadas-opentext-buy-software-firm-micro-focus-6-bln-deal-2022-08-25\/\" target=\"_blank\" rel=\"noreferrer noopener\">acquiring<\/a> Micro Focus this week), Bricata\u2019s next-generation NDR platform continues to give security administrators visibility into user, device, system, and application behavior inside networks. In addition to real-time context and alerts, Bricata offers clients advanced <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">forensics<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat hunting<\/a> tools to make the most of investigations and remediation actions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Bricata Next-Gen NDR Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Software-based and hardware agnostic with consumption-based pricing.<\/li><li>Signature inspection, ML-based malware conviction, and anomaly detection.<\/li><li>Automated analysis for threats with prioritized workflows to respond fast.<\/li><li>Extract and store metadata for investigations and future use.<\/li><li>Technology partners with Cylance, Elastic, Garland, OISF, Proofpoint, and Splunk.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Gigamon.png\" alt=\"Gigamon logo.\" class=\"wp-image-25180\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gigamon.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gigamon-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Gigamon<\/h3>\n\n\n\n<p>Started in 2004, Gigamon has long been in the network visibility game with a portfolio today consisting of traffic intelligence and cloud, network, and data center visibility. Within its network security stack, Gigamon ThreatINSIGHT is the company\u2019s cloud-based NDR solution for high-fidelity adversary detection and response. Evidence of Gigamon\u2019s strength as an NDR solution includes being a connector for almost every other top NDR pick. Their larger technology alliance partners is extensive with 60 of the best vendors for managing <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">network performance<\/a>, vulnerabilities, and cloud infrastructure. Previously a publicly traded company (NYSE:GIMO), Gigamon was acquired by private equity for $1.6 billion in 2016.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Gigamon ThreatINSIGHT Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Inspection of encrypted traffic and lateral movement for any device, network, and flow.<\/li><li>Omnisearch triage and investigation with up to 365 days of network metadata.<\/li><li>Ongoing detection tuning and QA with the Gigamon Applied Threat Research (ATR) unit.<\/li><li>Sensor and traffic diagnostics via the Gigamon technical success and SaaS Ops teams.<\/li><li>Integrations with AWS, Cisco, CrowdStrike, FireEye, New Relic, Nutanix, and Riverbed.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Exeon_.png\" alt=\"Exeon logo.\" class=\"wp-image-25184\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Exeon_.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Exeon_-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Exeon Analytics<\/h3>\n\n\n\n<p>Another budding NDR vendor, Exeon offers advanced security analytics to protect IT and OT environments. Launched in 2016 from the campus of the Swiss Federal Institute of Technology, the Zurich-based company\u2019s ExeonTrace seamlessly analyzes security-related log data from existing infrastructure. With comprehensive visibility, Exeon can help client\u2019s identify data leaks, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\" target=\"_blank\" rel=\"noreferrer noopener\">misconfigured<\/a> devices, shadow IT, and unusual services. While Exeon mentions the ability to connect SIEM, EDR, and IDPS systems, the list of connectors wasn\u2019t immediately available.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">ExeonTrace Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Fast deployment which doesn\u2019t require sensors or agents.<\/li><li>AI-based threat scoring to prioritize investigations.<\/li><li>Insight-driven visualizations including a global map of traffic sources.<\/li><li>Network log data analysis for lightweight solution vs. data-heavy traffic mirroring.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Honorable-Mention-NDR-Solutions\"><\/span>Honorable Mention NDR Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\">Arista Networks<\/td><td class=\"has-text-align-center\" data-align=\"center\">Blue Hexagon<\/td><td class=\"has-text-align-center\" data-align=\"center\">Broadcom Symantec<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Corelight<\/td><td class=\"has-text-align-center\" data-align=\"center\">Fidelis<\/td><td class=\"has-text-align-center\" data-align=\"center\">Hillstone Networks<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">LogRhythm<\/td><td class=\"has-text-align-center\" data-align=\"center\">Lumu<\/td><td class=\"has-text-align-center\" data-align=\"center\">Progress Flowmon<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Stamus Networks<\/td><td class=\"has-text-align-center\" data-align=\"center\">Threatbook<\/td><td class=\"has-text-align-center\" data-align=\"center\">VMware<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What-is-Network-Detection-Response\"><\/span>What is Network Detection &amp; Response?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Network detection and response (NDR) solutions complement tools like <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-to-tune-edr\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDR<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a> to analyze and detect malicious network traffic. In the next generation of network traffic analysis (NTA), NDR solutions offer AI and ML-based techniques to evaluate the latest signature-less attacks and unusual traffic patterns. When threats are detected, NDR solutions alert administrators to act or automate pre-configured preventative measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"NDR-Features\"><\/span>NDR Features<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Cognitive modeling to monitor and analyze tactics, techniques, and procedures (TTP).<\/li><li>Real-time and historical view of traffic for investigating suspicious behavior.<\/li><li>Context-driven visibility, advanced analytics, and IoC identification for threat hunting.<\/li><li>Built-in advanced <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">detection<\/a> with ability to fine-tune configuration management.<\/li><li>Integration with EDR, SIEM, SOAR, and other network security solutions.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Network-Security-and-NDR\"><\/span>Network Security and NDR<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>NDR is a complementary network security tool, joining a handful of other critical systems for an enterprise cybersecurity architecture:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud security<\/a><\/li><li>Endpoint detection and response (EDR)<\/li><li>Intrusion detection and prevention systems (<a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">IDPS<\/a>)<\/li><li>Network traffic analysis (NTA)<\/li><li>Next-generation firewalls (<a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">NGFW<\/a>)<\/li><li>Security information and event management (SIEM)<\/li><li>Security orchestration, automation, and response (<a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOAR<\/a>)<\/li><li>User and entity behavior analytics (<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">UEBA<\/a>)<\/li><\/ul>\n\n\n\n<p>In 2015, Gartner Research Director Anton Chuvakin introduced the conceptual framework for what would become the \u201cSOC visibility triad\u201d. In a 2020 <a href=\"https:\/\/medium.com\/anton-on-security\/back-in-2015-while-working-on-a-gartner-soc-paper-i-coined-the-concept-of-soc-nuclear-triad-8961004c734\" target=\"_blank\" rel=\"noreferrer noopener\">retrospective<\/a>, Chuvakin explains how logs (via SIEM), endpoint data (via EDR or XDR), and network data (via NTA and NDR) are critical to security visibility.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-1024x704.png\" alt=\"An infographic from Gartner displaying the SOC Visibility Triad.\" class=\"wp-image-25178\" width=\"650\" height=\"447\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-1024x704.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-300x206.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-768x528.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-150x103.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-218x150.png 218w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-696x478.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility-1068x734.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.Gartner.SOCVisbility.png 1500w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption>An infographic from Gartner displaying the SOC Visibility Triad.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Choose-a-NDR-Solution\"><\/span>How to Choose a NDR Solution<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As an emerging security solution, NDR shouldn&#8217;t be the first priority for companies building out their cybersecurity infrastructure. That said, the above network detection and response solutions offer plenty for enterprise organizations with well-established cybersecurity postures.<\/p>\n\n\n\n<p>While NDR vendors offer opportunities to bundle other network security tools, including robust portfolios from vendors like Cisco and Sangfor, a top consideration remains ease of integration with existing security systems for SIEM and EDR. Because most organizations aren\u2019t starting from scratch, NDR vendors must strive for interoperability with the leading network security products.<\/p>\n\n\n\n<p>In a crowded marketplace of cybersecurity solutions, NDR is yet another that is on the rise. Only time will tell how niche an audience it will serve. Keep an eye on how the NDR sector evolves in the years to come and whether it survives as a standalone solution and market or gets absorbed by more comprehensive frameworks like XDR.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6c91af32ac-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6c91af32ac\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6c91af32ac\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6c91af32ac\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6c91af32ac\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6c91af32ac\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6c91af32ac\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a central component of XDR. Whereas older solutions like antivirus, firewalls, and endpoint detection and response (EDR) have long focused on threats at the network perimeter, the intent of NDR is [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":25179,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21,19,14,17,15],"tags":[28055,31514,31952,31953,3414,3483,31954,30578],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[],"class_list":["post-25177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-endpoint","category-networks","category-products","category-threats","tag-edr","tag-mdr","tag-ndr","tag-network-detection-and-response","tag-network-security","tag-siem","tag-soar","tag-xdr","b2b_audience-evaluation-and-selection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Network Detection &amp; Response (NDR) Solutions | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Network Detection &amp; Response (NDR) Solutions | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-26T21:49:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-02T22:33:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Top Network Detection &#038; Response (NDR) Solutions\",\"datePublished\":\"2022-08-26T21:49:14+00:00\",\"dateModified\":\"2022-09-02T22:33:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\"},\"wordCount\":1532,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg\",\"keywords\":[\"EDR\",\"mdr\",\"NDR\",\"network detection and response\",\"network security\",\"SIEM\",\"SOAR\",\"XDR\"],\"articleSection\":[\"Cloud\",\"Endpoint\",\"Networks\",\"Products\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\",\"name\":\"Top Network Detection & Response (NDR) Solutions | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg\",\"datePublished\":\"2022-08-26T21:49:14+00:00\",\"dateModified\":\"2022-09-02T22:33:15+00:00\",\"description\":\"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"A man stands in a dark room with light green computer projected on his face. Who is this man? What is their plan? This article is about the latest network security tools, known as network detection and response or NDR software using AI and ML for advanced security analytics and inside threat detection and response.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Network Detection &#038; Response (NDR) Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Network Detection & Response (NDR) Solutions | eSecurity Planet","description":"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/","og_locale":"en_US","og_type":"article","og_title":"Top Network Detection & Response (NDR) Solutions | eSecurity Planet","og_description":"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.","og_url":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-26T21:49:14+00:00","article_modified_time":"2022-09-02T22:33:15+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Top Network Detection &#038; Response (NDR) Solutions","datePublished":"2022-08-26T21:49:14+00:00","dateModified":"2022-09-02T22:33:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/"},"wordCount":1532,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg","keywords":["EDR","mdr","NDR","network detection and response","network security","SIEM","SOAR","XDR"],"articleSection":["Cloud","Endpoint","Networks","Products","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/","url":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/","name":"Top Network Detection & Response (NDR) Solutions | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg","datePublished":"2022-08-26T21:49:14+00:00","dateModified":"2022-09-02T22:33:15+00:00","description":"Network detection and response (NDR) is one of the newer threat detection solutions focused on inside threats. Learn more now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/ESP.NDR_.Profile-scaled.jpg","width":2560,"height":1707,"caption":"A man stands in a dark room with light green computer projected on his face. Who is this man? What is their plan? This article is about the latest network security tools, known as network detection and response or NDR software using AI and ML for advanced security analytics and inside threat detection and response."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/ndr-network-detection-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top Network Detection &#038; Response (NDR) Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25177"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25177"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25179"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25177"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25177"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25177"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}