• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Detection and Response

Network Detection and Response Reviews and Ratings

What is Network Detection and Response?

Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyze raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south). NDR products include automated responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools. NDR can be delivered as a combination of hardware and software appliances for sensors, some with IaaS support. Management and orchestration consoles can be software or SaaS.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of FortiNDR
FortiNDR
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
For 50M-1B USD Companies
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of Trend Vision One
Trend Vision One
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
For Europe, Middle East and Africa
Logo of Corelight Open NDR Platform
Corelight Open NDR Platform
Logo of Darktrace / NETWORK
Darktrace / NETWORK
Logo of Vectra AI Platform
Vectra AI Platform
Integration & Deployment
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of FortiNDR
FortiNDR

Product Listings

Filter by

Products 1 - 20 of 63
Sort by
Logo of Darktrace / NETWORK

Darktrace / NETWORK

By Darktrace

4.8
(605 Ratings)
customers choice 2025

Darktrace is a Cambridge, UK-based firm concentrating on the mitigation of cyber disruptions globally. The company employs a unique AI technology used by thousands of businesses globally to counteract, identify, react to, and recover from cyber-attacks. With a team of over 2200 people spread over 30 global offices, Darktrace is dedicated to containing the global impacts of cyber threats.

Show More Details
Logo of Vectra AI Platform

Vectra AI Platform

By Vectra AI

4.8
(451 Ratings)

Vectra AI delivers an AI-driven hybrid attack detection, investigation and response platform. The Vectra AI Platform is the integrated signal providing hybrid attack surface coverage across identity, public cloud, SaaS, and data center networks; AI-driven Attack Signal Intelligence that prioritizes real attacks in real-time; and integrated, automated, and managed response services. Organizations worldwide rely on the Vectra AI Platform and MDR services to move at the speed and scale of hybrid attackers.

Show More Details
Logo of RevealX

RevealX

By ExtraHop

4.7
(252 Ratings)

ExtraHop is on a mission to reveal cyber risk and build business resilience by exposing threats organizations can’t see. The ExtraHop RevealX platform gives organizations visibility into the cyber threats, vulnerabilities, and network performance issues that evade their existing security and IT tools. With these risk insights, organizations can investigate smarter, stop threats faster, and keep operations running.

RevealX deploys on premises or in the cloud. It addresses the following use cases:

- ransomware

- software supply chain attacks

- zero trust

- IoT security

- lateral movement

- C2 communication

- security hygiene

- and more

Show More Details
Logo of Trend Vision One

Trend Vision One

By Trend Micro

4.8
(128 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Gatewatcher NDR Platform

Gatewatcher NDR Platform

By Gatewatcher

4.7
(111 Ratings)

Since 2015, Gatewatcher has been protecting the critical networks of worldwide large companies and public institutions. Our Network Detection and Response (NDR) and Cyber Threats Intelligence (CTI) solutions, quickly detect and respond to any cyber-attacks. Thanks to AI converging with dynamic analysis techniques, Gatewatcher delivers a real-time 360-degree view of threats, covering both cloud and on-premise infrastructures.

Show More Details
Logo of ThreatBook TDP NDR

ThreatBook TDP NDR

By ThreatBook

5
(108 Ratings)

ThreatBook is a provider of cyber threat detection and response services. We developed new approaches to deliver high-fidelity, efficient, and actionable security intelligence. We integrated these capabilities with a full life cycle threat detection system and incident response mechanisms to enhance protection across cloud, network, and endpoints. This helps enterprises respond to threats efficiently, reduce complexity, and improve security operations.

Show More Details
Logo of Cisco Secure Network Analytics

Cisco Secure Network Analytics

By Cisco Systems

4.7
(85 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Corelight Open NDR Platform

Corelight Open NDR Platform

By Corelight

4.8
(83 Ratings)

Corelight is a company that primarily focuses on network security. Its objective is to transform network and cloud data into detailed evidence to help counter ever-evolving cyber threats. The company offers an open Network Detection and Response (NDR) platform that provides a comprehensive, correlated view of the network, granting unmatched visibility to users. With the advantage of swift investigation, expert-like cyber threat hunting and potential attack disruption capabilities, Corelight targets to enhance cybersecurity preparedness. It offers both on-premise and cloud-based sensors capable of capturing standard industry telemetry and insights that align with pre-existing user tools and processes. Clients of Corelight span diverse sectors, including large scale businesses, government agencies and research institutions.

Show More Details
Logo of Open XDR Platform

Open XDR Platform

By Stellar Cyber

4.7
(83 Ratings)

Stellar Cyber is a Silicon Valley-based organization specializing in providing a comprehensive and integrated Open XDR platform dedicated to simplifying security processes. The platform's prime focus is to aid lean security teams of varying skills in fortifying their environment securely. By utilizing Stellar Cyber's platform, organizations can minimize risk through early and accurate detection and remediation of threats. Moreover, the platform allows for reduction in costs and enhancement of analyst productivity, featuring significant improvements in mean time to detect (MTTD) and mean time to recover (MTTR).

Show More Details
Logo of Sangfor Athena NDR

Sangfor Athena NDR

By Sangfor Technologies

4.9
(64 Ratings)

Founded in 2000, Sangfor Technologies is a multinational vendor of cybersecurity, IT infrastructure, and cloud computing solutions. The company invests at least 20% of annual revenue in R&D and has a corporate mission to Make Digital Transformation Simpler and Secure. Sangfor serves over 100,000 customers and operates more than 60 branches across APAC, EMEA, and LATAM.

The company offers a range of cybersecurity products, solutions, and services, including a next-generation firewall (NGFW), endpoint protection platform (EPP), secure web gateway (SWG), network detection & response (NDR), secure access service edge (SASE), anti-ransomware, extended detection & response (XDR), and managed detection & response (MDR).

Its IT infrastructure and cloud computing products, solutions, and services include hyperconverged infrastructure (HCI), virtual desktop infrastructure (VDI), software-defined storage (SDS), hybrid cloud, disaster recovery (DR), and managed cloud services (MCS).

Show More Details
Logo of LinkShadow iNDR

LinkShadow iNDR

By LinkShadow

4.8
(59 Ratings)

LinkShadow is a cybersecurity firm that offers a unique solution for detecting and handling complex threats. The company concentrates on developing defenses against advanced cyber-attacks, zero-day malware and ransomware. Further, it aims to provide insightful measures on the effectiveness of current security protocols in various organizations. The solution is the result of combined efforts by a team of specialists in multiple fields such as product development, solution architecture, and programming.

Show More Details
Logo of Hillstone Breach Detection System

Hillstone Breach Detection System

By Hillstone Networks

4.9
(58 Ratings)

Hillstone Networks is a cybersecurity firm providing comprehensive digital protection to over 28,000 enterprises globally. The company delivers integrative cybersecurity solutions to safeguard valuable business resources and infrastructure, extending its coverage from the edge to the cloud. Its cybersecurity approach offers control and consolidation in different technological environments, regardless of the workload's location. Hillstone Networks’ array of cybersecurity solutions focuses on the crucial aspect of securing digital transformation.

Show More Details
Logo of Symantec Security Analytics

Symantec Security Analytics

By Broadcom

4
(41 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of FortiNDR

FortiNDR

By Fortinet

4.9
(27 Ratings)

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Lumu Defender

Lumu Defender

By Lumu

4.5
(26 Ratings)

Lumu Technologies is a global cybersecurity firm that operates by identifying threats, attacks, and prospective harmful agents impacting businesses worldwide. The company employs actionable intelligence as a strategy to boost network security, enabling an increased performance of the pre-existing defense tactics. The services provided by Lumu Technologies aim to significantly improve the network security framework developed over the past quarter-century.

Show More Details
Logo of NetWitness Network

NetWitness Network

By NetWitness

4.7
(20 Ratings)

NetWitness develops, markets, and delivers products and services to detect, investigate, and respond to digital threats. NetWitness encompasses network, logs (SIEM) and endpoint data in a single back end, giving security analysts and threat hunters comprehensive visibility and the ability to conduct investigations and forensics across all of an organization's data.

NetWitness Professional services offers implementation, configuration, and training services, as well as incident response services approved by major cyberinsurance vendors.

Show More Details
Logo of Scrutinizer

Scrutinizer

By Plixer

4.6
(17 Ratings)

Plixer is a global Network Detection and Response (NDR) Cybersecurity platform. Its focus is providing complete visibility across networks, helping businesses identify and tackle advanced security threats swiftly and accurately. By utilizing state-of-the-art technology including AI, Plixer's solutions aid businesses in improving their security stance, providing real-time incident detection and response capabilities. This reduces both reputational and economic jeopardy. Established in 1999, Plixer is based in Kennebunk, ME.

Show More Details
Logo of QAX SkyEye

QAX SkyEye

By QAX

4.9
(15 Ratings)

QAX Group, established in 2014, is a prominent cyber security company based in China. The company's primary focus is to offer products and services related to cybersecurity. These solutions are widely utilized across various central government departments, enterprises led by the central government, and numerous large banks. In addition to its base in China, QAX Group has significantly expanded its operations globally, marking its presence in countries like Indonesia, Singapore, Canada, Hong Kong, and Macao. It has a significant workforce exceeding 8,000 employees. The company also played a role in the Olympic Winter Games Beijing 2022 as the Official Cyber Security Services and Anti-Virus Software Sponsor.

Show More Details
Logo of ExeonTrace Network Detection and Response (NDR) Platform

ExeonTrace Network Detection and Response (NDR) Platform

By Exeon

4.8
(14 Ratings)

Exeon is a Swiss cyber security company primarily focused on the protection of IT infrastructures through the use of AI-driven security analytics. The enterprise has established its flagship product, ExeonTrace, using complex algorithms derived from extensive academic research. The beneficial capabilities of these algorithms have been tested in the realm of global enterprise protection. The company operates with the assistance of an interdisciplinary team including data scientists, machine learning experts, cibernetic security specialists and business professionals. ExeonTrace, a future-proof Network Detection and Response (NDR) software, is developed to help security personnel monitor all network operations and detect potential risks. This software, using Metadata Analysis based algorithms, requires no hardware sensors, is unaffected by encryption and can be set up swiftly.

Show More Details
Logo of Trellix NDR

Trellix NDR

By Trellix

4.6
(14 Ratings)

Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.

Show More Details

Features of Network Detection and Response

Updated June 2025

Mandatory Features:

  • Deliver, via physical or virtual sensors, form factors compatible with on-premises and cloud networks to analyze raw network packet traffic or traffic flows (for example, IP flow information). NDR must also monitor north-south traffic (as it crosses the perimeter) and east-west traffic (as it moves laterally throughout the network).

  • Aggregate individual alerts into structured incidents to facilitate threat investigation, and provide automatic or manual response capabilities to react to the detection of malicious network traffic.

  • Automate responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools.

  • Include traditional detection techniques, such as intrusion detection and prevention system (IDPS) signatures, rule-based heuristics or threshold-based alerts.

  • Detect threats using Intelligence feeds whether internally or externally sourced.

  • Model normal network traffic and highlight unusual traffic activity that falls outside the normal range. NDR must also provide detection based on behavioral techniques (non-signature-based detection), including machine learning (ML) and advanced analytics that detect network anomalies.

Gartner Research

Magic Quadrant for Network Detection and Response
Gartner Peer Insights 'Voice of the Customer': Network Detection and Response

Top Trending Products

Corelight Open NDR PlatformLECSCisco Secure Network AnalyticsTrend Vision OneLinkShadow iNDRGatewatcher NDR PlatformVMware NSX Network Detection and ResponseFortiNDRDarktrace / NETWORKNetwork Blackbox

Popular Product Comparisons

Darktrace / NETWORK vs Vectra AI PlatformRevealX vs Vectra AI PlatformDarktrace / NETWORK vs FortiNDR

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.