Sophos NDR works together with your managed endpoints and firewalls to monitor network activity for suspicious and malicious patterns they cannot see. It detects abnormal traffic flows from unmanaged systems and IoT devices, rogue assets, insider threats, previously unseen zero-day attacks, and unusual patterns deep within the network.
Early Detection and Automatic Response
Sophos cross-product automation between NDR, XDR, MDR, and Firewall provides immediate response to stop active threats dead in their tracks.
How it works: Sophos NDR monitors traffic deep within the network, sending suspicious activity to Sophos Central’s data lake for further analysis. In the event an active threat or adversary is identified, analysts can immediately push a threat feed to Sophos Firewall that can coordinate an Active Threat Response to isolate and block malicious activity automatically in real-time.
5 Independent Detection Engines That Work in Real-Time
Data Detection Engine
Extensible query engine uses a deep learning prediction model to analyze encrypted traffic and identify patterns across unrelated network flows.
Deep Packet Inspection
Uses known indicators of compromise to identify threat actors and malicious tactics, techniques, and procedures across encrypted and unencrypted network traffic.
Encrypted Payload Analysis
Detects zero-day C2 servers and new variants of malware families based on patterns found in the session size, direction, and interarrival times.
Domain Generation Algorithm
Identifies dynamic domain generation technology used by malware to avoid detection.
Session Risk Analytics
Powerful logic engine utilizes rules that send alerts based on session-based risk factors.