NDR (Network Detection And Response)
What it is
Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your environment. For a deeper look, see our NDR explainer.
Why it matters
Attackers can slip past endpoints or use unmanaged devices. NDR sees what crosses the wire - lateral movement, data exfiltration, C2 beacons - so you can detect, contain, and respond even when malware hides.
How it works - quick tour
-
Deep visibility: inspects north-south and east-west traffic on key taps or SPANs
-
Behavior and ML: baselines normal activity and flags anomalies
-
Threat intel correlation: matches domains, IPs, and protocols against feeds
-
Response hooks: enriches alerts and can trigger blocks or quarantines
Where it fits
-
Complements EDR/XDR on endpoints and SIEM for log correlation
-
Covers IoT, OT, and shadow IT that you cannot install agents on
-
Ideal for finding lateral movement and quiet data leaks
Quick setup tips
-
Monitor core choke points and critical VLANs first
-
Feed alerts to your SIEM and unify triage workflows
-
Tune early noise - whitelist known services and back-ups
-
Enable automatic enrichment and test block lists before auto-response
-
Pair with deception assets to increase signal quality
Glossary (A–Z)
Related Articles
EDR (Endpoint Detection and Response)
What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
XDR (Extended Detection and Response)
What it is XDR is a security system that watches your company’s devices, email, cloud, and network together and connects the dots. Instead of separate tools, XDR pulls all the signals into one place, spots attacks faster, and can auto-block bad ...
APT (Advanced Persistent Threat)
What it is An APT is a long-game, targeted attack. Skilled attackers quietly break in, move sideways through the network, and stay hidden for weeks or months to steal sensitive data—not to make noise. Think careful recon, staged break-ins, and ...
Blended Threat
What it is A blended threat mixes several attack tricks at once—think phishing email + exploit link + worm-style spread—so one weak spot opens the door for the rest. It’s a combo hit designed to move fast, hide well, and do more damage than any ...
OSINT (Open-Source Intelligence)
What it is OSINT is the practice of gathering publicly available information - news, websites, social media, forums, government records, maps - and combining it to learn about a person, company, or event. For a quick primer and tool ideas, see our ...