Content deleted Content added
Added tags to the page using Page Curation (copy edit, notability) |
fixed a broken link added a supporting citation |
||
(12 intermediate revisions by 4 users not shown) | |||
Line 1:
{{notability|date=May 2024}}
{{short description|Threat monitoring technology}}
'''Network detection and response (NDR)''' refers to a category of [[network security]] products that detect abnormal system [[Behavior|behaviors]] by continuously analyzing network traffic. NDR solutions apply [[behavioral analytics]] to inspect raw [[Packet analyzer|network packets]] and [[metadata]] for both internal (east-west) and external (north-south) network communications.<ref name=":0">{{Cite web |last=Jonathan Nunez, Andrew Davies |date=20 July 2023 |title=Hype Cycle for Security Operations, 2023 |url=https://www.gartner.com/doc/reprints?id=1-2EIN4TVS&ct=230721&st=sb&__hstc=45788219.57a590308de95e51d2f62b49fac710ef.1691078838873.1691078838873.1691078838873.1&__hssc=45788219.1.1691078838873&__hsfp=3812163218&hsCtaTracking=51e2e4ef-078c-41c0-a8bf-673c4e38176a%7C2cb608e8-3bb2-41fb-96a8-b3d410ee1978 |access-date=2023-08-08 |website=www.gartner.com}}</ref>▼
'''Network detection and response (NDR)'''<ref>{{Cite web |title=What is network detection and response (NDR)? |url=https://www.sophos.com/en-us/cybersecurity-explained/network-detection-and-response |website=Sophos |access-date=2025-08-29}}</ref>
▲
== Description ==
NDR is delivered through a combination of [[Computer hardware|hardware]] and [[software]] sensors, along with a software or [[Software as a service|SaaS]] management console. Organizations use NDR to detect and contain malicious post-breach activity
NDR provides visibility into network activities to identify anomalies using [[machine learning]] algorithms.<ref name=":3">{{Cite web |last=Maor |first=Etay |title=Council Post: EDR, XDR, MDR: Making Sense Of Threat Detection And Response Acronyms |url=https://www.forbes.com/sites/forbestechcouncil/2024/03/05/edr-xdr-mdr-making-sense-of-threat-detection-and-response-acronyms/ |access-date=2024-05-21 |website=Forbes |language=en}}</ref> The automated response capabilities can help reduce the workload for security teams. NDR also assists incident responders with threat hunting by supplying context and analysis.<ref name=":0" />
Deployment options include physical or virtual sensors. Sensors are typically out-of-band, positioned to monitor network flows without impacting performance. Cloud-based NDR options integrate with IaaS providers to gain visibility across hybrid environments. Ongoing tuning helps reduce false positives. NDR competes against broader platforms like [[SIEM]] and [[Extended detection and response|XDR]] for security budgets.<ref name=":0" /> NDR can be used to complement EDR's blind spot.<ref name=":3" /><ref>{{Cite web |title=Change Is Coming to the Network Detection and Response (NDR) Market |url=https://www.darkreading.com/cyber-risk/change-is-coming-to-the-network-detection-and-response-ndr-market |access-date=2024-05-21 |website=www.darkreading.com |language=en}}</ref>
Key capabilities offered by NDR solutions include
==History==
The origins of NDR trace back to [[network traffic analysis]] (NTA) solutions that emerged around 2019. NTA provided greater visibility into network activities to quickly identify and respond to potential threats.<ref name=":2">{{Cite web |last=Wiens |first=Christian |date=2023-02-02 |title=A Comprehensive Guide to Network Detection & Response (NDR) — What CIOs & Security Analysts Should Know |url=https://securityboulevard.com/2023/02/a-comprehensive-guide-to-network-detection-response-ndr-what-cios-security-analysts-should-know/ |access-date=2023-08-15 |website=Security Boulevard |language=en-US}}</ref>
By 2020, NTA adoption was growing for real-time threat detection. That year, a study found that 87% of organizations used NTA, with 43% considering it a "first line of defense
Major attacks like [[WannaCry]] in 2017 and the [[SolarWinds]] breach in 2020 highlighted the need for solutions like NDR. Traditional perimeter defenses and signature-based tools proved insufficient against modern threats.<ref name=":2" />
==
The use of [[artificial intelligence]] in NDR tools is growing, as security teams explore AI's potential to enhance NDR capabilities. Key AI use cases for NDR include:<ref name=":1">{{Cite web |last=Grady |first=John |title=How AI benefits network detection and response |url=https://www.techtarget.com/searchsecurity/opinion/How-AI-benefits-network-detection-and-response |access-date=2023-08-15 |website=TechTarget |language=en}}</ref>
* Improved threat detection
* Alert prioritization
* Analyst workflow optimization
* Automated response
* Security team communications
== NDR Vendors ==
According to [[Gartner]], NDR vendors include [[Cisco]], Corelight, [[Darktrace]], [https://www.linkshadow.com/ LinkShadow] [[ExtraHop Networks|ExtraHop]], [[Fortinet]], IronNet, MixMode, Plixer, [[Trend Micro]], Trellix, [[Vectra AI]].<ref name=":0" />
== References ==
|