Network Detection and Response (NDR): This method involves continuous monitoring of network behavior using machine learning to detect unknown threats and anomalies that traditional methods may miss. Traditional network detection methods that rely on signature-based rules are outmatched against more sophisticated threats that exploit previously unknown vulnerabilities.

Managed Detection and Response (MDR): Using a third-party contractor, an organization lacking in-house cybersecurity resources can receive NDR solutions that offer skilled personnel to interpret alerts and respond to threats. While highly effective, NDR is not plug-and-play. Trained cybersecurity personnel are still needed to operate the relevant solutions, sift through alerts, and act as needed.

Extended Detection and Response (XDR): This method consolidates security data from various sources, providing a unified view to detect and respond to potential attacks across endpoints, networks, and other assets. A network has countless potential breach points, including endpoints (defined as any device that connects with the network), networks, servers, cloud deployments, physical security systems, and more.

Endpoint Detection and Response (EDR): This paradigm helps organizations to secure endpoints by monitoring activity, detecting suspicious behavior, and isolating compromised devices to help prevent broader network infiltration. In the post-COVID remote-working era, endpoints have increased exponentially. A single employee may routinely access the network from four or more different devices during a given workday, which can quickly tally up to thousands of potential attack points.

Security Information and Event Management (SIEM): This method is used to analyze the entire IT environment to identify patterns and anomalies, complementing NDR and EDR to provide thorough visibility and threat detection. NDR, EDR, and SIEM can form a “visibility triad” offering unique security capabilities to collectively account for any blind spots between them.

Security Orchestration, Automation, and Response (SOAR): This method is used to analyze the entire IT environment to identify patterns and anomalies, complementing NDR and EDR to provide thorough visibility and threat detection. NDR, EDR, and SIEM can form a “visibility triad” offering unique security capabilities to collectively account for any blind spots between them.