NEW

3 Cybersecurity Predictions for 2025

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?

Share blog icon

Back to top

Back to top

February 19, 2021

Where Does NDR Stand in the 2020 Gartner Hype Cycle for Security Operations?

Savvy security professionals have long turned to the network for vital insight and forensic evidence. Now, the broader market is starting to understand Network Detection and Response (NDR), and getting closer to acknowledging and taking advantage of its true potential.

The 2020 Gartner Hype Cycle for Security Operations shows NDR well past the Peak of Inflated Expectations, and drawing near to the Slope of Enlightenment. The report defines NDR as follows:

"Network detection and response (NDR) technology uses a combination of machine learning, rule-based detection and advanced analytics to detect suspicious activities on enterprise networks. NDR tools analyze raw traffic and/or flow records (for example, NetFlow) to build models that reflect normal network behavior. When the NDR tools detect abnormal traffic patterns, they raise alerts. NDR solutions monitor north-south and east-west traffic. These tools also provide workflow capabilities to enable security teams to respond to incidents."

The report goes on to note the Business Impact of NDR:

"NDR solutions are valuable tools that assist network security professionals in the detection of compromised endpoints and targeted attacks. These tools have limited native blocking ability, or none at all (because most are implemented outside of the line of traffic), but they offer manual and/or automatic functionality for responding to alerts. Many NDR solutions can also be implemented to detect suspicious activity in IaaS environments."

Furthermore, many security operations teams have adopted the SOC Visibility Triad as a way of broadly defining their security requirements. The triad indicates three foundational data sources for security operations: endpoint data, logs, and network data. With EDR and SIEM already well established in the Slope of Enlightenment, and NDR coming close, the future looks bright for teams pursuing this winning strategy.

To view the complete Hype Cycle for Security Operations, click here.

blog image
Blog author
Chase Snyder

Security Product Marketing Manager

As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.

Chase Snyder

Share
LinkedIn logoX logoFacebook logo

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo