• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Application Integration Platforms
      • Code Modernization Tools
      • Event Brokers
      • Virtual Reality Development Software
      • Digital Twin of an Organization Platforms
      • Green Software Engineering
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • AI Agent Development Platforms for Software Engineering
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Detection and Response

Network Detection and Response Reviews and Ratings

What is Network Detection and Response?

Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyze raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south). NDR products include automated responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools. NDR can be delivered as a combination of hardware and software appliances for sensors, some with IaaS support. Management and orchestration consoles can be software or SaaS.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of FortiNDR
FortiNDR
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
For 50M-1B USD Companies
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of Darktrace / NETWORK
Darktrace / NETWORK
For Europe, Middle East and Africa
Logo of Corelight Open NDR Platform
Corelight Open NDR Platform
Logo of Darktrace / NETWORK
Darktrace / NETWORK
Logo of Vectra AI Platform
Vectra AI Platform
Integration & Deployment
Logo of ThreatBook TDP NDR
ThreatBook TDP NDR
Logo of Hillstone Breach Detection System
Hillstone Breach Detection System
Logo of FortiNDR
FortiNDR

Product Listings

Filter by

Products 1 - 20 of 65
Sort by
Logo of Darktrace / NETWORK

Darktrace / NETWORK

By Darktrace

4.8
(607 Ratings)
customers choice 2025

Darktrace NETWORK is a cybersecurity software designed to identify and respond to cyber threats within enterprise network environments. The software utilizes machine learning technology to analyze network activity, detect anomalies, and provide real-time alerts on potential security incidents. It helps organizations manage risks by offering automated response capabilities to contain threats and minimize disruptions. Darktrace NETWORK supports monitoring across cloud, on-premises, and hybrid infrastructures, enabling visibility into network traffic and vulnerabilities. The software assists organizations in maintaining security posture, reducing the potential for data breaches, and addressing advanced persistent threats by continuously adapting to evolving attack techniques.

Show More Details
Logo of Vectra AI Platform

Vectra AI Platform

By Vectra AI

4.7
(451 Ratings)

Vectra AI is an AI-driven threat detection and response for hybrid and multi-cloud enterprises platform. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. Organizations worldwide rely on the Vectra AI Platform to move at the speed and scale of hybrid attackers.

Show More Details
Logo of RevealX

RevealX

By ExtraHop

4.7
(253 Ratings)

RevealX from ExtraHop is a platform for network detection and response (NDR) and network performance management (NPM). It leverages full packet capture, SSL and TLS 1.3 decryption, machine learning, and cloud capabilities to automatically discover devices connecting to organizations' networks, and to help organizations expose and resolve cyber threats, vulnerabilities, and IT performance issues. RevealX captures full network packets across OSI layers 2-7 at scale and line rate speed, without degrading network performance, which allows organizations to capture richer metadata and detect, investigate, and resolve threats and performance issues faster. Additionally, RevealX decodes more than 70 application, database, network, and internet protocols, including Microsoft protocols, in real time, which facilitates faster troubleshooting and mean time to detect, investigate, and resolve threats and performance issues. ExtraHop offers additional modules for IDS and forensics with RevealX.

Show More Details
Logo of Open XDR Platform

Open XDR Platform

By Stellar Cyber

4.7
(242 Ratings)

Open XDR Platform is a software developed by Stellar Cyber designed to unify security operations by integrating various security tools and sources into a single interface. The software facilitates threat detection, investigation, and response by correlating data from endpoints, networks, cloud environments, and other security data streams. It automates workflows and consolidates alerts to reduce information silos and enhance analysis efficiency. The software aims to address challenges in managing multiple cybersecurity solutions and enables security teams to gain centralized visibility, streamline case management, and accelerate incident response within complex IT infrastructures.

Show More Details
Logo of Gatewatcher NDR Platform

Gatewatcher NDR Platform

By Gatewatcher

4.7
(133 Ratings)

Gatewatcher NDR Platform is a software designed to detect, monitor, and respond to network threats within enterprise environments. It uses network detection and response technologies to analyze traffic, identify anomalies, and provide insights into potential malicious activity. The software features threat intelligence integration, protocol analysis, and automated alerting to facilitate incident response. Its purpose is to help organizations address challenges related to advanced cyber threats, including lateral movement, data exfiltration, and targeted attacks, by delivering visibility into network events and enabling security teams to investigate and remediate suspicious actions. The software supports scalable deployment across diverse network architectures and aids in maintaining security compliance and minimizing risk exposure.

Show More Details
Logo of Trend Vision One

Trend Vision One

By Trend Micro

4.7
(129 Ratings)

Trend Vision One is a cybersecurity software developed to provide extended detection and response capabilities across endpoints, servers, cloud environments, and email. The software integrates security data from multiple sources to enable threat detection, investigation, and response through a unified console. It offers automated threat analysis, security posture visibility, and incident remediation tools designed to improve organizational security operations and minimize the impact of cyber threats. The software is utilized by businesses to address challenges such as detecting advanced attacks, reducing investigation times, and maintaining compliance with security standards. Its feature set includes correlation of security events, comprehensive reporting, and integration with third-party security solutions.

Show More Details
Logo of Corelight Open NDR Platform

Corelight Open NDR Platform

By Corelight

4.8
(119 Ratings)

Corelight's Open NDR Platform transforms network and cloud activity into evidence so defenders can stay ahead of ever-changing attacks. Delivered through an open, extensible architecture powered by Zeek, Suricata, and YARA, it combines network security monitoring, intrusion detection, static file analysis, AI, and Smart PCAP in one platform. Corelight applies the right detection approach per threat, using machine learning, behavioral analytics, and signatures to reduce false positives and accelerate detection engineering response time. By correlating alerts, packets, and context into structured, comprehensive evidence, Corelight enhances visibility, analytics, and investigation speed while integrating seamlessly with existing SIEM, XDR, and SOAR tools.

Show More Details
Logo of ThreatBook TDP NDR

ThreatBook TDP NDR

By ThreatBook

5
(108 Ratings)

ThreatBook TDP NDR is a software designed to identify, analyze, and respond to network-based threats within enterprise environments. The software uses network detection and response capabilities to monitor network traffic, detect anomalies, and provide insights into potential security incidents. It leverages threat intelligence and behavioral analysis to uncover hidden risks and deliver detailed threat context. The software supports the investigation of security events by providing automated alerts, forensic data, and visualization of attack paths. It aims to enhance threat visibility, streamline incident response, and support security teams in mitigating risks posed by advanced persistent threats and malware.

Show More Details
Logo of Cisco Secure Network Analytics

Cisco Secure Network Analytics

By Cisco Systems

4.7
(85 Ratings)

Cisco Secure Network Analytics is a software designed to provide network visibility and security monitoring for enterprise environments. The software offers features such as behavioral analytics, threat detection, and network traffic analysis by collecting and analyzing telemetry data from various network devices. It helps organizations identify anomalies, unauthorized activities, and policy violations across the network. The software supports real-time and retrospective investigation to enable faster response to security incidents. By leveraging automated alerting and advanced analytics, the software assists in detecting potential threats, reducing dwell time, and improving incident response. Organizations use this software to address security and compliance requirements related to network activity and to enhance the protection of digital assets against internal and external threats.

Show More Details
Logo of LinkShadow iNDR

LinkShadow iNDR

By LinkShadow

4.8
(65 Ratings)

LinkShadow iNDR is a software designed to deliver network detection and response capabilities within enterprise environments. The software leverages machine learning and behavioral analytics to monitor network traffic, identify anomalies, and detect threats such as intrusions or unauthorized access. iNDR provides visibility across various segments of the network, enabling security teams to investigate incidents with context-driven insights. The software generates alerts and supports incident response workflows to help organizations address vulnerabilities and limit the impact of security breaches. Its features target the need for proactive threat detection and support compliance requirements by offering advanced reporting and forensic analysis.

Show More Details
Logo of Sangfor Athena NDR

Sangfor Athena NDR

By Sangfor Technologies

4.9
(64 Ratings)

Sangfor Athena NDR is a software designed to provide network detection and response capabilities. The software utilizes artificial intelligence and machine learning to analyze network traffic, identify abnormal behaviors, and detect potential security threats. It offers threat intelligence integration, automated investigation features, and alerting functionalities to help organizations manage and respond to network security incidents. Sangfor Athena NDR aims to address challenges related to advanced persistent threats, unauthorized access, and lateral movement within the network by delivering real-time visibility and continuous monitoring. The software supports security teams by assisting in the detection, investigation, and mitigation of network-borne attacks, helping organizations strengthen their cybersecurity posture.

Show More Details
Logo of Hillstone Breach Detection System

Hillstone Breach Detection System

By Hillstone Networks

4.9
(58 Ratings)

Hillstone Breach Detection System is a software designed to detect and respond to network security breaches by monitoring traffic and analyzing behavior patterns within enterprise environments. The software utilizes threat intelligence, behavioral analysis, and advanced detection techniques to identify suspicious activities and potential threats across various protocols and applications. By providing real-time alerts and comprehensive reporting, the software helps organizations improve their incident response capabilities and remediate vulnerabilities more effectively. It addresses the business problem of unauthorized access and data compromise by offering tools for proactive protection of critical assets and rapid identification of anomalous behaviors and attack vectors within the network infrastructure.

Show More Details
Logo of Symantec Security Analytics

Symantec Security Analytics

By Broadcom

4
(41 Ratings)

Symantec Security Analytics is a software designed to support network security teams in detecting, analyzing, and responding to cyber threats. The software offers real-time visibility into network traffic, capturing, indexing, and storing packets for deep inspection. It enables users to conduct retrospective analysis and forensic investigations by reconstructing sessions and identifying indicators of compromise. The software integrates with security information and event management solutions and automates threat intelligence sharing. By providing detailed insights into network activity, Symantec Security Analytics helps address the challenge of incident response and aids organizations in mitigating risks associated with advanced persistent threats and data breaches.

Show More Details
Logo of FortiNDR

FortiNDR

By Fortinet

4.9
(28 Ratings)

FortiNDR is a software designed to detect, analyze, and respond to network threats using artificial intelligence and machine learning. The software provides automated threat investigation by analyzing network traffic and identifying suspicious behaviors and anomalies. It delivers incident response capabilities by enabling security teams to contain and remediate threats across both cloud and on-premises environments. FortiNDR integrates with existing security ecosystems, providing deep visibility into attack progression and supporting the identification of threats such as malware, ransomware, and unauthorized access attempts. The software supports network forensics, investigation, and threat intelligence sharing to facilitate efficient security operations and reduce the time required to detect and remediate security incidents.

Show More Details
Logo of Lumu Defender

Lumu Defender

By Lumu

4.5
(26 Ratings)

Lumu Defender is a software designed to detect, measure, and respond to cybersecurity threats across enterprise networks. It continuously monitors network traffic to identify anomalies and compromise patterns by leveraging threat intelligence and proprietary algorithms. The software integrates with existing security infrastructure to automate incident response processes and offers visibility into potential risks affecting endpoints, cloud environments, email, and other digital assets. Organizations can use this software to address the business problem of undetected cyber threats and streamline their threat response operations, helping ensure a proactive security posture by transforming network metadata into actionable insights for security teams.

Show More Details
Logo of NetWitness Network

NetWitness Network

By NetWitness

4.7
(20 Ratings)

NetWitness Network is a software developed to provide advanced network traffic analysis for security operations. The software aids in detecting threats by collecting and inspecting network data across physical, virtual, and cloud environments. It uses deep packet inspection and metadata extraction to enable visibility into network activity, facilitating incident response and threat investigation workflows. NetWitness Network assists organizations in identifying suspicious patterns, monitoring lateral movement, and uncovering hidden threats by correlating network events. The software is designed to support forensic analysis and to automate tasks related to alerting and threat intelligence integration, helping to address business challenges related to network security, unauthorized access, and data breaches.

Show More Details
Logo of Scrutinizer

Scrutinizer

By Plixer

4.5
(17 Ratings)

Scrutinizer is a network traffic analysis software that provides visibility into network activities by collecting and analyzing flow data from various sources such as routers, switches, and firewalls. The software supports multiple flow protocols including NetFlow, sFlow, and IPFIX, enabling detailed examination of traffic patterns and application performance across the network. Scrutinizer assists organizations in detecting and investigating security threats, managing bandwidth usage, and monitoring compliance with internal policies. It offers reporting features that help in identifying trends, troubleshooting issues, and optimizing network operations. The software is designed to address challenges related to network security, performance monitoring, and data-driven decision-making.

Show More Details
Logo of QAX SkyEye

QAX SkyEye

By QAX

4.9
(15 Ratings)

QAX SkyEye is a software designed to provide network traffic analysis and security monitoring capabilities for enterprise environments. The software offers features such as detection of network threats, analysis of abnormal behaviors, and traffic visualization, aiming to enhance network visibility and situational awareness. QAX SkyEye helps organizations identify potential risks, trace the source of security incidents, and respond to threats in a timely manner. By collecting and analyzing network data, the software addresses business challenges related to internal and external cyber threats, supporting network operation security and compliance requirements. The solution is suitable for various network environments and integrates with other security systems to streamline security operations.

Show More Details
Logo of Exeon.NDR

Exeon.NDR

By Exeon

4.8
(14 Ratings)

Exeon.NDR is a software designed to help organizations detect, investigate, and respond to network threats. The software uses data analysis and machine learning techniques to monitor network traffic, identify suspicious activities, and provide visibility into network communications. It supports encrypted traffic analysis and integrates with various network infrastructures. Exeon.NDR offers features such as anomaly detection, automated alerting, and forensic analysis to help security teams quickly identify and address potential security incidents. By focusing on network behavior rather than relying on traditional signature-based detection, the software aims to address challenges related to advanced threats and lateral movement within networks.

Show More Details
Logo of Trellix NDR

Trellix NDR

By Trellix

4.6
(14 Ratings)

Trellix NDR is a software designed to provide network detection and response capabilities for organizations, focusing on identifying and addressing advanced threats within network traffic. The software uses machine learning and threat intelligence to analyze packet data, detect anomalous behavior, and enable security operations teams to investigate suspicious activity. It provides contextual visibility into network environments and supports incident response workflows by correlating network events with other security solutions. Trellix NDR aids in automating threat detection, prioritizing alerts, and streamlining forensic analysis to help organizations reduce the risk of breaches, uncover hidden threats, and respond efficiently to security incidents.

Show More Details

Features of Network Detection and Response

Updated June 2025

Mandatory Features:

  • Deliver, via physical or virtual sensors, form factors compatible with on-premises and cloud networks to analyze raw network packet traffic or traffic flows (for example, IP flow information). NDR must also monitor north-south traffic (as it crosses the perimeter) and east-west traffic (as it moves laterally throughout the network).

  • Aggregate individual alerts into structured incidents to facilitate threat investigation, and provide automatic or manual response capabilities to react to the detection of malicious network traffic.

  • Automate responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools.

  • Include traditional detection techniques, such as intrusion detection and prevention system (IDPS) signatures, rule-based heuristics or threshold-based alerts.

  • Detect threats using Intelligence feeds whether internally or externally sourced.

  • Model normal network traffic and highlight unusual traffic activity that falls outside the normal range. NDR must also provide detection based on behavioral techniques (non-signature-based detection), including machine learning (ML) and advanced analytics that detect network anomalies.

Gartner Research

Magic Quadrant for Network Detection and Response
Gartner Peer Insights 'Voice of the Customer': Network Detection and Response

Top Trending Products

Open XDR PlatformCorelight Open NDR PlatformGatewatcher NDR PlatformLinkShadow iNDRRevealXFortiNDRDarktrace / NETWORKProgress Flowmon

Popular Product Comparisons

Darktrace / NETWORK vs Vectra AI PlatformRevealX vs Vectra AI PlatformDarktrace / NETWORK vs FortiNDRDarktrace / NETWORK vs RevealX

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.