• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Detection and Response

Network Detection and Response Reviews and Ratings

What is Network Detection and Response?

Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyze raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south). NDR products include automated responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools. NDR can be delivered as a combination of hardware and software appliances for sensors, some with IaaS support. Management and orchestration consoles can be software or SaaS.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of FortiNDR
FortiNDR
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
For 50M-1B USD Companies
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Darktrace / NETWORK
Darktrace / NETWORK
For Europe, Middle East and Africa
Logo of Corelight Open NDR Platform
Corelight Open NDR Platform
Logo of Darktrace / NETWORK
Darktrace / NETWORK
Logo of Vectra AI Platform
Vectra AI Platform
Integration & Deployment
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of FortiNDR
FortiNDR

Product Listings

Filter by

Products 1 - 20 of 65
Sort by
Logo of Darktrace / NETWORK

Darktrace / NETWORK

By Darktrace

4.8
(606 Ratings)
customers choice 2025

Darktrace NETWORK is a cybersecurity software designed to identify and respond to cyber threats within enterprise network environments. The software utilizes machine learning technology to analyze network activity, detect anomalies, and provide real-time alerts on potential security incidents. It helps organizations manage risks by offering automated response capabilities to contain threats and minimize disruptions. Darktrace NETWORK supports monitoring across cloud, on-premises, and hybrid infrastructures, enabling visibility into network traffic and vulnerabilities. The software assists organizations in maintaining security posture, reducing the potential for data breaches, and addressing advanced persistent threats by continuously adapting to evolving attack techniques.

Show More Details
Logo of Vectra AI Platform

Vectra AI Platform

By Vectra AI

4.7
(452 Ratings)

Vectra AI is an AI-driven threat detection and response for hybrid and multi-cloud enterprises platform. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. Organizations worldwide rely on the Vectra AI Platform to move at the speed and scale of hybrid attackers.

Show More Details
Logo of RevealX

RevealX

By ExtraHop

4.7
(252 Ratings)

RevealX from ExtraHop is a platform for network detection and response (NDR) and network performance management (NPM). It leverages full packet capture, SSL and TLS 1.3 decryption, machine learning, and cloud capabilities to automatically discover devices connecting to organizations' networks, and to help organizations expose and resolve cyber threats, vulnerabilities, and IT performance issues. RevealX captures full network packets across OSI layers 2-7 at scale and line rate speed, without degrading network performance, which allows organizations to capture richer metadata and detect, investigate, and resolve threats and performance issues faster. Additionally, RevealX decodes more than 70 application, database, network, and internet protocols, including Microsoft protocols, in real time, which facilitates faster troubleshooting and mean time to detect, investigate, and resolve threats and performance issues. ExtraHop offers additional modules for IDS and forensics with RevealX.

Show More Details
Logo of Open XDR Platform

Open XDR Platform

By Stellar Cyber

4.7
(136 Ratings)

Open XDR Platform is a software developed by Stellar Cyber designed to unify security operations by integrating various security tools and sources into a single interface. The software facilitates threat detection, investigation, and response by correlating data from endpoints, networks, cloud environments, and other security data streams. It automates workflows and consolidates alerts to reduce information silos and enhance analysis efficiency. The software aims to address challenges in managing multiple cybersecurity solutions and enables security teams to gain centralized visibility, streamline case management, and accelerate incident response within complex IT infrastructures.

Show More Details
Logo of Gatewatcher NDR Platform

Gatewatcher NDR Platform

By Gatewatcher

4.7
(133 Ratings)

Gatewatcher NDR Platform is a software designed to detect, monitor, and respond to network threats within enterprise environments. It uses network detection and response technologies to analyze traffic, identify anomalies, and provide insights into potential malicious activity. The software features threat intelligence integration, protocol analysis, and automated alerting to facilitate incident response. Its purpose is to help organizations address challenges related to advanced cyber threats, including lateral movement, data exfiltration, and targeted attacks, by delivering visibility into network events and enabling security teams to investigate and remediate suspicious actions. The software supports scalable deployment across diverse network architectures and aids in maintaining security compliance and minimizing risk exposure.

Show More Details
Logo of Trend Vision One

Trend Vision One

By Trend Micro

4.8
(129 Ratings)

Trend Vision One is a cybersecurity software developed to provide extended detection and response capabilities across endpoints, servers, cloud environments, and email. The software integrates security data from multiple sources to enable threat detection, investigation, and response through a unified console. It offers automated threat analysis, security posture visibility, and incident remediation tools designed to improve organizational security operations and minimize the impact of cyber threats. The software is utilized by businesses to address challenges such as detecting advanced attacks, reducing investigation times, and maintaining compliance with security standards. Its feature set includes correlation of security events, comprehensive reporting, and integration with third-party security solutions.

Show More Details
Logo of Corelight Open NDR Platform

Corelight Open NDR Platform

By Corelight

4.8
(117 Ratings)

Corelight's Open NDR Platform transforms network and cloud activity into evidence so defenders can stay ahead of ever-changing attacks. Delivered through an open, extensible architecture powered by Zeek, Suricata, and YARA, it combines network security monitoring, intrusion detection, static file analysis, AI, and Smart PCAP in one platform. Corelight applies the right detection approach per threat, using machine learning, behavioral analytics, and signatures to reduce false positives and accelerate detection engineering response time. By correlating alerts, packets, and context into structured, comprehensive evidence, Corelight enhances visibility, analytics, and investigation speed while integrating seamlessly with existing SIEM, XDR, and SOAR tools.

Show More Details
Logo of ThreatBook TDP NDR

ThreatBook TDP NDR

By ThreatBook

5
(108 Ratings)

ThreatBook TDP NDR is a software designed to identify, analyze, and respond to network-based threats within enterprise environments. The software uses network detection and response capabilities to monitor network traffic, detect anomalies, and provide insights into potential security incidents. It leverages threat intelligence and behavioral analysis to uncover hidden risks and deliver detailed threat context. The software supports the investigation of security events by providing automated alerts, forensic data, and visualization of attack paths. It aims to enhance threat visibility, streamline incident response, and support security teams in mitigating risks posed by advanced persistent threats and malware.

Show More Details
Logo of Cisco Secure Network Analytics

Cisco Secure Network Analytics

By Cisco Systems

4.7
(85 Ratings)

Cisco Secure Network Analytics is a software designed to provide network visibility and security monitoring for enterprise environments. The software offers features such as behavioral analytics, threat detection, and network traffic analysis by collecting and analyzing telemetry data from various network devices. It helps organizations identify anomalies, unauthorized activities, and policy violations across the network. The software supports real-time and retrospective investigation to enable faster response to security incidents. By leveraging automated alerting and advanced analytics, the software assists in detecting potential threats, reducing dwell time, and improving incident response. Organizations use this software to address security and compliance requirements related to network activity and to enhance the protection of digital assets against internal and external threats.

Show More Details
Logo of Sangfor Athena NDR

Sangfor Athena NDR

By Sangfor Technologies

4.9
(64 Ratings)

Sangfor Athena NDR is a software designed to provide network detection and response capabilities. The software utilizes artificial intelligence and machine learning to analyze network traffic, identify abnormal behaviors, and detect potential security threats. It offers threat intelligence integration, automated investigation features, and alerting functionalities to help organizations manage and respond to network security incidents. Sangfor Athena NDR aims to address challenges related to advanced persistent threats, unauthorized access, and lateral movement within the network by delivering real-time visibility and continuous monitoring. The software supports security teams by assisting in the detection, investigation, and mitigation of network-borne attacks, helping organizations strengthen their cybersecurity posture.

Show More Details
Logo of LinkShadow iNDR

LinkShadow iNDR

By LinkShadow

4.8
(60 Ratings)

LinkShadow iNDR is a software designed to deliver network detection and response capabilities within enterprise environments. The software leverages machine learning and behavioral analytics to monitor network traffic, identify anomalies, and detect threats such as intrusions or unauthorized access. iNDR provides visibility across various segments of the network, enabling security teams to investigate incidents with context-driven insights. The software generates alerts and supports incident response workflows to help organizations address vulnerabilities and limit the impact of security breaches. Its features target the need for proactive threat detection and support compliance requirements by offering advanced reporting and forensic analysis.

Show More Details
Logo of Hillstone Breach Detection System

Hillstone Breach Detection System

By Hillstone Networks

4.9
(58 Ratings)

Hillstone Breach Detection System is a software designed to detect and respond to network security breaches by monitoring traffic and analyzing behavior patterns within enterprise environments. The software utilizes threat intelligence, behavioral analysis, and advanced detection techniques to identify suspicious activities and potential threats across various protocols and applications. By providing real-time alerts and comprehensive reporting, the software helps organizations improve their incident response capabilities and remediate vulnerabilities more effectively. It addresses the business problem of unauthorized access and data compromise by offering tools for proactive protection of critical assets and rapid identification of anomalous behaviors and attack vectors within the network infrastructure.

Show More Details
Logo of Symantec Security Analytics

Symantec Security Analytics

By Broadcom

4
(41 Ratings)

Symantec Security Analytics is a software designed to support network security teams in detecting, analyzing, and responding to cyber threats. The software offers real-time visibility into network traffic, capturing, indexing, and storing packets for deep inspection. It enables users to conduct retrospective analysis and forensic investigations by reconstructing sessions and identifying indicators of compromise. The software integrates with security information and event management solutions and automates threat intelligence sharing. By providing detailed insights into network activity, Symantec Security Analytics helps address the challenge of incident response and aids organizations in mitigating risks associated with advanced persistent threats and data breaches.

Show More Details
Logo of FortiNDR

FortiNDR

By Fortinet

4.9
(27 Ratings)

FortiNDR is a software designed to detect, analyze, and respond to network threats using artificial intelligence and machine learning. The software provides automated threat investigation by analyzing network traffic and identifying suspicious behaviors and anomalies. It delivers incident response capabilities by enabling security teams to contain and remediate threats across both cloud and on-premises environments. FortiNDR integrates with existing security ecosystems, providing deep visibility into attack progression and supporting the identification of threats such as malware, ransomware, and unauthorized access attempts. The software supports network forensics, investigation, and threat intelligence sharing to facilitate efficient security operations and reduce the time required to detect and remediate security incidents.

Show More Details
Logo of Lumu Defender

Lumu Defender

By Lumu

4.5
(26 Ratings)

Lumu Defender is a software designed to detect, measure, and respond to cybersecurity threats across enterprise networks. It continuously monitors network traffic to identify anomalies and compromise patterns by leveraging threat intelligence and proprietary algorithms. The software integrates with existing security infrastructure to automate incident response processes and offers visibility into potential risks affecting endpoints, cloud environments, email, and other digital assets. Organizations can use this software to address the business problem of undetected cyber threats and streamline their threat response operations, helping ensure a proactive security posture by transforming network metadata into actionable insights for security teams.

Show More Details
Logo of NetWitness Network

NetWitness Network

By NetWitness

4.7
(20 Ratings)

NetWitness Network is a software developed to provide advanced network traffic analysis for security operations. The software aids in detecting threats by collecting and inspecting network data across physical, virtual, and cloud environments. It uses deep packet inspection and metadata extraction to enable visibility into network activity, facilitating incident response and threat investigation workflows. NetWitness Network assists organizations in identifying suspicious patterns, monitoring lateral movement, and uncovering hidden threats by correlating network events. The software is designed to support forensic analysis and to automate tasks related to alerting and threat intelligence integration, helping to address business challenges related to network security, unauthorized access, and data breaches.

Show More Details
Logo of Scrutinizer

Scrutinizer

By Plixer

4.5
(17 Ratings)

Scrutinizer is a network traffic analysis software that provides visibility into network activities by collecting and analyzing flow data from various sources such as routers, switches, and firewalls. The software supports multiple flow protocols including NetFlow, sFlow, and IPFIX, enabling detailed examination of traffic patterns and application performance across the network. Scrutinizer assists organizations in detecting and investigating security threats, managing bandwidth usage, and monitoring compliance with internal policies. It offers reporting features that help in identifying trends, troubleshooting issues, and optimizing network operations. The software is designed to address challenges related to network security, performance monitoring, and data-driven decision-making.

Show More Details
Logo of QAX SkyEye

QAX SkyEye

By QAX

4.9
(15 Ratings)

QAX SkyEye is a software designed to provide network traffic analysis and security monitoring capabilities for enterprise environments. The software offers features such as detection of network threats, analysis of abnormal behaviors, and traffic visualization, aiming to enhance network visibility and situational awareness. QAX SkyEye helps organizations identify potential risks, trace the source of security incidents, and respond to threats in a timely manner. By collecting and analyzing network data, the software addresses business challenges related to internal and external cyber threats, supporting network operation security and compliance requirements. The solution is suitable for various network environments and integrates with other security systems to streamline security operations.

Show More Details
Logo of ExeonTrace Network Detection and Response (NDR) Platform

ExeonTrace Network Detection and Response (NDR) Platform

By Exeon

4.8
(14 Ratings)

ExeonTrace Network Detection and Response (NDR) Platform is a software designed to help organizations detect, investigate, and respond to network threats. The software uses data analysis and machine learning techniques to monitor network traffic, identify suspicious activities, and provide visibility into network communications. It supports encrypted traffic analysis and integrates with various network infrastructures. ExeonTrace offers features such as anomaly detection, automated alerting, and detailed forensics to assist security teams in quickly identifying and addressing potential security incidents. By focusing on network behavior rather than relying on traditional signature-based detection, the software aims to address challenges related to advanced threats and lateral movement within networks.

Show More Details
Logo of Trellix NDR

Trellix NDR

By Trellix

4.6
(14 Ratings)

Trellix NDR is a software designed to provide network detection and response capabilities for organizations, focusing on identifying and addressing advanced threats within network traffic. The software uses machine learning and threat intelligence to analyze packet data, detect anomalous behavior, and enable security operations teams to investigate suspicious activity. It provides contextual visibility into network environments and supports incident response workflows by correlating network events with other security solutions. Trellix NDR aids in automating threat detection, prioritizing alerts, and streamlining forensic analysis to help organizations reduce the risk of breaches, uncover hidden threats, and respond efficiently to security incidents.

Show More Details

Features of Network Detection and Response

Updated June 2025

Mandatory Features:

  • Deliver, via physical or virtual sensors, form factors compatible with on-premises and cloud networks to analyze raw network packet traffic or traffic flows (for example, IP flow information). NDR must also monitor north-south traffic (as it crosses the perimeter) and east-west traffic (as it moves laterally throughout the network).

  • Aggregate individual alerts into structured incidents to facilitate threat investigation, and provide automatic or manual response capabilities to react to the detection of malicious network traffic.

  • Automate responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools.

  • Include traditional detection techniques, such as intrusion detection and prevention system (IDPS) signatures, rule-based heuristics or threshold-based alerts.

  • Detect threats using Intelligence feeds whether internally or externally sourced.

  • Model normal network traffic and highlight unusual traffic activity that falls outside the normal range. NDR must also provide detection based on behavioral techniques (non-signature-based detection), including machine learning (ML) and advanced analytics that detect network anomalies.

Gartner Research

Magic Quadrant for Network Detection and Response
Gartner Peer Insights 'Voice of the Customer': Network Detection and Response

Top Trending Products

Open XDR PlatformCorelight Open NDR PlatformGatewatcher NDR PlatformLECSProgress FlowmonVectra AI PlatformDarktrace / NETWORKTrend Vision OneLinkShadow iNDRNetGuard Cybersecurity Dome

Popular Product Comparisons

Darktrace / NETWORK vs Vectra AI PlatformRevealX vs Vectra AI PlatformDarktrace / NETWORK vs FortiNDRDarktrace / NETWORK vs RevealX

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.