Skip to main content
TrustRadius
Network Detection and Response

Network Detection and Response

Overview

What is Network Detection and Response?

Network Detection and Response, offered by Verizon, is a solution designed to deliver network visibility, threat detection, and forensic analysis of suspicious activities. This tool is aimed at organizations of all sizes, including small, medium, and large enterprises. According to the vendor, IT security...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Network Monitoring Tools

Be the first one in your network to review Network Detection and Response, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is EclecticIQ Platform?

EclecticIQ Platform is an analyst-centric Threat Intelligence Platform (TIP). The vendor says it is optimized for the collection of intelligence data from open sources, commercial suppliers and industry partnerships into a single collaborative analyst workbench. EclecticIQ Platform aims to…

What is Trellix Network Security?

Trellix Network Security (formerly FireEye Network Security and Forensics products) combines network traffic analysis and network forensics for attack analysis .

Return to navigation

Product Details

What is Network Detection and Response?

Network Detection and Response, offered by Verizon, is a solution designed to deliver network visibility, threat detection, and forensic analysis of suspicious activities. This tool is aimed at organizations of all sizes, including small, medium, and large enterprises. According to the vendor, IT security professionals, network administrators, cybersecurity analysts, security operations centers (SOCs), and financial institutions can benefit from the capabilities of this product.

Key Features

Visibility: Gain deep visibility into the network for comprehensive threat analysis, discovery, and action. Interact with data recorded over time and stored in the cloud to proactively hunt and respond to security events and observations.

Value: Deploy the solution without the need for specialized hardware, potentially reducing cost and complexity. With cloud delivery, rapidly deploy the product in any segment of the modern network while potentially eliminating the need for costly hardware investments.

Effectiveness: Potentially accelerate incident response and threat hunting with advanced forensics capabilities. Identify and respond to future attacks before they become serious events. Analyze, proactively hunt, and potentially take action on security events and observations.

Control: Potentially filter and prioritize threats by providing complete context from network to endpoint. Potentially reduce noise by filtering data and focusing on prioritized threats. According to the vendor, the system provides an interface to quickly act on threat intelligence.

Scalability: Potentially capture, optimize, and store massive amounts of network traffic from multiple infrastructures. Analyze large volumes of data, up to 550TB per day, presented in an intuitive and immersive interface for comprehensive analysis.

Ease of Integration: Potentially integrate seamlessly with existing security investments for enhanced threat detection and visibility. Leverage the organization's security ecosystem by integrating with the existing security infrastructure.

Real-Time and Retrospective Threat Detection: Potentially respond immediately to security events with near real-time threat detection. Analyze past events and identify patterns with retrospective threat detection. Identify and respond to threats in both real-time and historical contexts.

Forensic Analysis: Potentially conduct advanced forensic analysis of suspicious activities on the network. Investigate security incidents and breaches in-depth with the necessary tools for comprehensive forensic analysis.

Network Detection and Response Features

  • Supported: Activity Tracking
  • Supported: Bandwidth Monitoring
  • Supported: Dashboard
  • Supported: Network Analysis
  • Supported: Real Time Monitoring
  • Supported: Server Monitoring
  • Supported: Threshold Alerts
  • Supported: Activity Dashboard
  • Supported: Alerts/Notifications
  • Supported: Data Visualization
  • Supported: Real Time Data

Network Detection and Response Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based, Mac, Windows
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation