Sophos Network Detection and Response

Sophos NDR Provides Critical Visibility into Network Activity That Other Products Miss

Speak with an Expert Get a Quote

Sophos Network Detection and Response (NDR) 2:15

Detect Suspicious Behaviors That Extend Beyond Your Firewalls and Endpoints

Zero Trust illustration

 

 

 

Sophos NDR works together with your managed endpoints and firewalls to monitor network activity for suspicious and malicious patterns they cannot see. It detects abnormal traffic flows from unmanaged systems and IoT devices, rogue assets, insider threats, previously unseen zero-day attacks, and unusual patterns deep within the network.

Download Solution Brief

Sophos NDR detects a range of network behaviors, making it an effective solution for identifying:

Home illustration

Unprotected Devices

Identify legitimate devices that aren't protected and could be used as entry points, including IoT and OT assets.

Client isolation icon

Rogue Assets

Pinpoint unauthorized and potentially malicious devices communicating across a network.

Networks and Endpoints icon

Insider Threats

Gain visibility to network traffic flows and “normal” data movement from inside an organization.

Hacker illustration

Zero-Day Attacks

Detect server command-and-control (C2) attempts based on patterns found in session packets.

Early Detection and Automatic Response

Sophos cross-product automation between NDR, XDR, MDR, and Firewall provides immediate response to stop active threats dead in their tracks.

sophos-ndr-active-threat-response-diagram

How it works: Sophos NDR monitors traffic deep within the network, sending suspicious activity to Sophos Central’s data lake for further analysis. In the event an active threat or adversary is identified, analysts can immediately push a threat feed to Sophos Firewall that can coordinate an Active Threat Response to isolate and block malicious activity automatically in real-time.

Learn More About Sophos MDR Learn More About Sophos XDR

5 Independent Detection Engines That Work in Real-Time

 

NDR Detection Engines

Data Detection Engine 

Extensible query engine uses a deep learning prediction model to analyze encrypted traffic for patterns across unrelated network flows and detect port scanning and SSH brute force activity.

Deep Packet Inspection

Uses known indicators of compromise to identify threat actors and malicious tactics, techniques, and procedures across encrypted and unencrypted network traffic.

Encrypted Payload Analysis

Detects zero-day C2 servers and new variants of malware families based on patterns found in the session size, direction, and interarrival times.

Domain Generation Algorithm

Identifies dynamic domain generation technology used by malware to avoid detection.

Session Risk Analytics

Powerful logic engine utilizes rules that send alerts based on session-based risk factors.

Get valuable insights and perform deep investigations

Sophos Central and the Sophos NDR Investigation Console provides all the tools you need to easily:

  • Get instant insights into into network and application activity, risky flows, and suspicious traffic detections in Sophos Central
  • Drill-down and perform deep forensic investigations with the Investigation Console
  • Identify all unmanaged, IoT, and potential rogue assets on your network including their manufacturer and operating system

See NDR in action

ndr-sophos-central-status