  # Best Network Detection and Response (NDR) Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Network detection and response (NDR) software is used to document business network activity for security threats and alert relevant parties or automate threat remediation. These tools work by monitoring east-west traffic and comparing them to established baselines. When traffic behavior deviates from normal functionality, the solution will detect the issue and assist in forensic investigation. Many tools include or integrate with other solutions that automate incident response processes to minimize the threat’s impact.

These tools are used by security professionals and IT staff to observe network traffic and detect anomalies related to user behavior. Other, older technologies may offer one component of network threat detection or incident response, but NDR combines the functionality of numerous security solutions. These tools use artificial intelligence and machine learning to analyze user behavior as well as existing security data; security professionals can then use that data to develop streamlined discovery and response workflows.

[Network traffic analysis (NTA)](https://www.g2.com/categories/network-traffic-analysis-nta) is a similar emerging technology related to NDR. NTA is the core technology behind NDR; it refers to the analytical and monitoring capabilities used to develop baselines and response frameworks as NDR. But NTA solutions do not have the same level of response automation and end-user, behavioral anomaly detection used to trigger incident response. [Endpoint detection and response (EDR)](https://www.g2.com/categories/endpoint-detection-response-edr) has a similar name, but products within that category only detect issues at the device level while NDR provides visibility to threats across the entire network.

To qualify for inclusion in the Network Detection and Response (NDR) category, a product must:

- Analyze network traffic in real time
- Utilize AI or ML to develop baselines for network behavior 
- Automate threat and anomaly detection across the network
- Deploy network forensics upon detection for investigation and remediation




  ## How Many Network Detection and Response (NDR) Software Products Does G2 Track?
**Total Products under this Category:** 67

  
## How Does G2 Rank Network Detection and Response (NDR) Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 1,200+ Authentic Reviews
- 67+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Network Detection and Response (NDR) Software Is Best for Your Use Case?

- **Leader:** [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
- **Highest Performer:** [Heimdal](https://www.g2.com/products/heimdal/reviews)
- **Easiest to Use:** [Sophos NDR](https://www.g2.com/products/sophos-ndr/reviews)
- **Top Trending:** [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
- **Best Free Software:** [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)

  
---

**Sponsored**

### ManageEngine ADAudit Plus

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compliant. ADAudit Plus transforms raw and noisy event log data into real-time reports and alerts, enabling you to get full visibility into activities happening across your Windows Server ecosystem in just a few clicks. More than 10,000 organizations across the world trust ADAudit Plus to: 1. Instantly notify them about changes in their Windows Server environments. 2. Continuously track Windows user logon activity. 3. Monitor the active and idle time spent by employees at their workstations. 4. Detect and troubleshoot AD account lockouts. 5. Provide a consolidated audit trail of privileged user activities across their domains. 6. Track changes and sign-ins in Azure AD. 7. Audit file accesses across Windows, NetApp, EMC, Synology, Hitachi, and Huawei file systems. 8. Monitor file integrity across local files residing on Windows systems. 9. Mitigate insider threats by leveraging UBA and response automation. 10. Generate audit-ready compliance reports for SOX, the GDPR, and other IT mandates.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2380&amp;secure%5Bdisplayable_resource_id%5D=2380&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2380&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=5691&amp;secure%5Bresource_id%5D=2380&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fnetwork-detection-and-response-ndr&amp;secure%5Btoken%5D=aefa320d914ae323e73f8663a179b74c2c3dc70779be742da33c461667b0bafa&amp;secure%5Burl%5D=https%3A%2F%2Fwww.manageengine.com%2Fproducts%2Factive-directory-audit%2F%3Futm_source%3DG2%26utm_medium%3Dtpac%26utm_campaign%3DADAP-network-detection-response&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Network Detection and Response (NDR) Software Products in 2026?
### 1. [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
  TrendAI Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk across your organization. The platform provides powerful risk insights, earlier threat detection, and automated risk and threat response options. Utilize the platform’s predictive machine learning and advanced security analytics for a broader perspective and advanced context. TrendAI Vision One integrates with its own expansive protection platform portfolio and industry-leading global threat intelligence, in addition to a broad ecosystem of purpose-built and API-driven third-party integrations.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 246
**How Do G2 Users Rate TrendAI Vision One?**

- **Metadata Enrichment:** 7.2/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.7/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.1/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind TrendAI Vision One?**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Company Website:** https://www.trendmicro.com/
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 33% Mid-Market


#### What Are TrendAI Vision One's Pros and Cons?

**Pros:**

- Visibility (38 reviews)
- Security (33 reviews)
- Ease of Use (32 reviews)
- Features (31 reviews)
- Threat Detection (27 reviews)

**Cons:**

- Complex Interface (12 reviews)
- Integration Issues (12 reviews)
- Learning Curve (11 reviews)
- Expensive (10 reviews)
- Limited Features (10 reviews)

### 2. [Sophos NDR](https://www.g2.com/products/sophos-ndr/reviews)
  Sophos NDR works together with your managed endpoints and firewalls to monitor network activity for suspicious and malicious patterns they cannot see. It detects abnormal traffic flows from unmanaged systems and IoT devices, rogue assets, insider threats, previously unseen zero-day attacks, and unusual patterns deep within the network.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 16
**How Do G2 Users Rate Sophos NDR?**

- **Metadata Enrichment:** 9.8/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.9/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.8/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.4/10 (Category avg: 8.8/10)

**Who Is the Company Behind Sophos NDR?**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,753 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)
- **Ownership:** LSE:SOPH

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 100% Small-Business


### 3. [Darktrace / NETWORK](https://www.g2.com/products/darktrace-network/reviews)
  Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect and autonomously contain any activity that could cause business disruption including known, novel and insider threats. - Sophisticated agentic AI to automate triage and investigation at speed and scale - Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR - Over 10,000 customers globally


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 43
**How Do G2 Users Rate Darktrace / NETWORK?**

- **Metadata Enrichment:** 9.3/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.2/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.3/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Darktrace / NETWORK?**

- **Seller:** [Darktrace](https://www.g2.com/sellers/darktrace)
- **Company Website:** https://www.darktrace.com
- **Year Founded:** 2013
- **HQ Location:** Cambridgeshire, England
- **Twitter:** @Darktrace (18,181 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5013440/ (2,548 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 59% Mid-Market, 33% Enterprise


#### What Are Darktrace / NETWORK's Pros and Cons?

**Pros:**

- Monitoring (5 reviews)
- Artificial Intelligence (4 reviews)
- Threat Detection (4 reviews)
- Customer Support (3 reviews)
- Cybersecurity (3 reviews)

**Cons:**

- Learning Curve (6 reviews)
- Expensive (4 reviews)
- Alert Issues (2 reviews)
- Complex Setup (2 reviews)
- False Positives (2 reviews)

### 4. [Cortex XDR](https://www.g2.com/products/palo-alto-networks-cortex-xdr/reviews)
  Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics and rich data to detect stealthy threats. Your SOC team can cut through the noise and focus on what matters most with intelligent alert grouping and incident scoring. Cross-data insights accelerate investigations, so you can streamline incident response and recovery. Cortex XDR delivers peace of mind with best-in-class endpoint protection that achieved the highest combined protection and detection scores in the MITRE ATT&amp;CK® round 3 evaluation. The Cortex XDR platform collects and analyzes all data, so you can gain complete visibility and holistic protection to secure what’s next.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 50
**How Do G2 Users Rate Cortex XDR?**

- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)

**Who Is the Company Behind Cortex XDR?**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,825 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 38% Mid-Market


#### What Are Cortex XDR's Pros and Cons?

**Pros:**

- Ease of Use (2 reviews)
- Threat Detection (2 reviews)
- XDR Capabilities (2 reviews)
- Alert Notifications (1 reviews)
- Antivirus Protection (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Complexity (1 reviews)
- Complex Management (1 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)

### 5. [ExtraHop](https://www.g2.com/products/extrahop/reviews)
  ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance management uniquely delivers the instant visibility and unparalleled decryption capabilities organizations need to expose the cyber risks and performance issues that other tools can’t see. When organizations have full network transparency with ExtraHop, they can investigate smarter, stop threats faster, and keep operations running. RevealX deploys on premises or in the cloud. It addresses the following use cases: - Ransomware - Zero trust - Software supply chain attacks - Lateral movement and C2 communication - Security hygiene - Network and Application Performance Management - IDS - Forensics and more A few of our differentiators: Continuous and on-demand PCAP: Full packet processing is superior to NetFlow and yields higher quality detections. Strategic decryption across a variety of protocols, including SSL/TLS, MS-RPC, WinRM, and SMBv3, gives you better visibility into early-stage threats hiding in encrypted traffic as they attempt to move laterally across your network. Protocol coverage: RevealX decodes more than 70 network protocols. Cloud-scale machine learning: Rather than relying on limited &quot;on-box&quot; compute power for analysis and detections, RevealX uses sophisticated cloud-hosted and cloud-scale machine learning workloads to identify suspicious behavior in real time and create high-fidelity alerts. ExtraHop was named a Leader in The Forrester Wave™: Network Analysis and Visibility, Q2 2023. Key Technology Integration and Go-to-Market Partners: CrowdStrike: RevealX integrates with CrowdStrike Falcon® LogScale, Falcon Insight XDR, Falcon Threat Graph, and Falcon Intelligence. Splunk SOAR AWS Google Cloud Security Founded in 2007, ExtraHop is privately held and headquartered in Seattle, Wash. To learn more, visit www.extrahop.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 68
**How Do G2 Users Rate ExtraHop?**

- **Metadata Enrichment:** 9.1/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.3/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.8/10 (Category avg: 8.8/10)

**Who Is the Company Behind ExtraHop?**

- **Seller:** [ExtraHop Networks](https://www.g2.com/sellers/extrahop-networks)
- **Year Founded:** 2007
- **HQ Location:** Seattle, Washington
- **Twitter:** @ExtraHop (10,736 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/extrahop-networks/ (800 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Hospital &amp; Health Care, Transportation/Trucking/Railroad
  - **Company Size:** 69% Enterprise, 26% Mid-Market


#### What Are ExtraHop's Pros and Cons?

**Pros:**

- All-in-One Solution (1 reviews)
- Comprehensive Monitoring (1 reviews)
- Easy Deployment (1 reviews)
- Responsive Support (1 reviews)


### 6. [Heimdal](https://www.g2.com/products/heimdal/reviews)
  Accommodate all your cybersecurity needs under one convenient roof with the Heimdal® Unified Cybersecurity Platform. Our cybersecurity solutions can be used as standalone products or integrated into one another as part of a cohesive and unified XDR platform. Whether you’re a reseller, distributor, MSSP, or an organization committed to bolstering your online security, we provide an array of cutting-edge products to make your mission smoother. Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimdal has experienced spectacular growth by proactively building products that anticipate threatscape trends. The company offers a multi-layeredand unified security suite that combines threat prevention, patch and asset management, endpoint rights management, antivirus and mail security which together secure customers against cyberattacks and keep critical information and intellectual property safe. Heimdal has been recognized as a thought leader in the industry and has won multiple international awards both for its solutions and for its educational content creation. The Heimdal line of products currently consists of 10 products and 2 services. The former category encompasses DNS Security for Endpoints &amp; Network, Patch &amp; Asset Management, Privileged Access Management, Application Control, Next-Gen Endpoint Antivirus, Ransomware Encryption Protection, Email Security, Email Fraud Prevention, and Remote Desktop. The latter is represented by Endpoint Detection &amp; Response, as well as eXtended Detection &amp; Response, or EDR and XDR for short. Currently, Heimdal’s cybersecurity solutions are deployed in more than 45 countries and supported regionally from offices in 15+ countries, by 175+ highly qualified specialists. Heimdal is ISAE 3000 certified and secures more than 2 million endpoints for over 10,000 companies. The company supports its partners without concessions on the basis of predictability and scalability. The common goal is to create a sustainable ecosystem and a strategic partnership.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 61
**How Do G2 Users Rate Heimdal?**

- **Quality of Support:** 9.5/10 (Category avg: 8.9/10)

**Who Is the Company Behind Heimdal?**

- **Seller:** [Heimdal®](https://www.g2.com/sellers/heimdal)
- **Company Website:** https://heimdalsecurity.com/
- **Year Founded:** 2014
- **HQ Location:** Copenhagen, Denmark
- **Twitter:** @HeimdalSecurity (5,109 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/heimdal-security/ (264 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Construction
  - **Company Size:** 61% Mid-Market, 26% Small-Business


#### What Are Heimdal's Pros and Cons?

**Pros:**

- Product Quality (2 reviews)
- Reliability (2 reviews)
- Security (2 reviews)
- 24/7 Availability (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Complex Interface (2 reviews)
- Not User-Friendly (2 reviews)
- Poor Interface Design (2 reviews)
- User Difficulty (2 reviews)
- User Interface (2 reviews)

### 7. [Verizon Network Detection and Response](https://www.g2.com/products/verizon-network-detection-and-response/reviews)
  Network Detection and Response is a cloud-delivered network security platform that helps you take action against threats and identify future threats with speed, accuracy and scale.


  **Average Rating:** 3.6/5.0
  **Total Reviews:** 16
**How Do G2 Users Rate Verizon Network Detection and Response?**

- **Metadata Enrichment:** 8.3/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.5/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind Verizon Network Detection and Response?**

- **Seller:** [Verizon](https://www.g2.com/sellers/verizon)
- **Year Founded:** 1983
- **HQ Location:** Basking RIdge, NJ
- **Twitter:** @Verizon (1,489,322 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1103/ (99,850 employees on LinkedIn®)
- **Ownership:** NYSE:VZ

**Who Uses This Product?**
  - **Company Size:** 44% Small-Business, 31% Enterprise


### 8. [NETSCOUT Network Security](https://www.g2.com/products/netscout-network-security/reviews)
  NETSCOUT Network Security Solution Suite, known as Omnis Security, is a high-performance threat detection and response platform engineered for the scale and complexity of modern enterprise networks. Built on NETSCOUT’s Smart Data technology, it transforms raw packet data into actionable intelligence in real time, enabling security teams to detect, investigate, and mitigate threats across hybrid cloud, data center, and edge environments. Omnis Security delivers continuous, packet-level visibility across the entire infrastructure, eliminating blind spots and enabling deep forensic analysis. Its analytics engine correlates network telemetry with threat intelligence to surface both known and unknown threats, including zero-day exploits and lateral movement. Adaptive Threat Analytics power thorough threat investigation workflows reduce mean time to detect and respond, while full-fidelity packet capture supports retrospective analysis and compliance requirements. Designed for scalability and operational efficiency, Omnis Security integrates seamlessly with leading SIEM and SOAR platforms, including Splunk, IBM QRadar, and Palo Alto Networks Cortex XSOAR. This integration enables security teams to enrich alerts with high-fidelity network context, automate incident response actions, and orchestrate workflows across the broader security stack—enhancing both detection accuracy and response speed. For practitioners defending complex, distributed environments, NETSCOUT Omnis Security delivers the visibility, intelligence, and interoperability needed to stay ahead of advanced threats and streamline security operations. Products included in this solution are: - Omnis Cyber Intelligence - Omnis CyberStream - nGenius Decryption Appliance


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 11
**How Do G2 Users Rate NETSCOUT Network Security?**

- **Quality of Support:** 10.0/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 10.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind NETSCOUT Network Security?**

- **Seller:** [NETSCOUT](https://www.g2.com/sellers/netscout)
- **Company Website:** https://www.netscout.com
- **Year Founded:** 1984
- **HQ Location:** Westford, Mass.
- **Twitter:** @NETSCOUT (13,789 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/netscout/ (2,691 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 55% Enterprise, 27% Mid-Market


#### What Are NETSCOUT Network Security's Pros and Cons?

**Pros:**

- Artificial Intelligence (1 reviews)


### 9. [Rapid7 Next-Gen SIEM](https://www.g2.com/products/rapid7-next-gen-siem/reviews)
  Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing early and reliable out of the box detections, and delivering rich visual investigations and automation to expedite response. With a lightweight cloud deployment and intuitive UI and onboarding experience, InsightIDR customers recognize an accelerated return on their investment and start seeing valuable insights from Day 1. With InsightIDR, teams can advance their threat detection and response program without adding headcount.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 67
**How Do G2 Users Rate Rapid7 Next-Gen SIEM?**

- **Metadata Enrichment:** 8.3/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Rapid7 Next-Gen SIEM?**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (124,244 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,275 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 66% Mid-Market, 31% Enterprise


#### What Are Rapid7 Next-Gen SIEM's Pros and Cons?

**Pros:**

- Ease of Use (2 reviews)
- Easy Integrations (2 reviews)
- Integrations (2 reviews)
- Threat Detection (2 reviews)
- Visibility (2 reviews)

**Cons:**

- Limited Features (2 reviews)
- Alerting Issues (1 reviews)
- Alert Management (1 reviews)
- Difficult Customization (1 reviews)
- Difficult Setup (1 reviews)

### 10. [Blumira Automated Detection &amp; Response](https://www.g2.com/products/blumira-automated-detection-response/reviews)
  Blumira is an integrated security operations platform built for growing teams and the partners supporting them to gain complete visibility into their environment, identify and address risk faster, and deliver advanced security and compliance. The platform includes: - Managed Detections for automated threat hunting to identify attacks early - AI Investigation with 98.5% accurate, human-in-the-loop triage validated against real cases - Rapid Response with automation and 1-click actions to contain and block threats immediately - One Year of Data Retention with unlimited log ingestion to satisfy compliance requirements - Advanced Reporting and dashboards for forensics and easy investigation - Endpoint &amp; Identity Protection (EDR/ITDR) for real-time remediation across devices and users - 24/7 Security Operations support for critical priority issues


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 122
**How Do G2 Users Rate Blumira Automated Detection &amp; Response?**

- **Metadata Enrichment:** 6.7/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.5/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.9/10 (Category avg: 8.6/10)
- **Network Visibility:** 7.9/10 (Category avg: 8.8/10)

**Who Is the Company Behind Blumira Automated Detection &amp; Response?**

- **Seller:** [Blumira](https://www.g2.com/sellers/blumira)
- **Company Website:** https://www.blumira.com
- **Year Founded:** 2018
- **HQ Location:** Ann Arbor, Michigan
- **Twitter:** @blumira (1 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/blumira/ (67 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Mid-Market, 36% Small-Business


#### What Are Blumira Automated Detection &amp; Response's Pros and Cons?

**Pros:**

- Ease of Use (33 reviews)
- Customer Support (20 reviews)
- Setup Ease (20 reviews)
- Alerting (16 reviews)
- Alert Management (16 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Alert System (7 reviews)
- Expensive (6 reviews)
- Faulty Detection (6 reviews)
- Inefficient Alert System (6 reviews)

### 11. [Cisco Secure Network Analytics](https://www.g2.com/products/cisco-secure-network-analytics/reviews)
  Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 31
**How Do G2 Users Rate Cisco Secure Network Analytics?**

- **Metadata Enrichment:** 8.9/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.9/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 10.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind Cisco Secure Network Analytics?**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,419 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 33% Small-Business


### 12. [NetWitness Platform](https://www.g2.com/products/netwitness-platform/reviews)
  NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data across all capture points (logs, packets, netflow, endpoint and IoT) and computing platforms (physical, virtual and cloud), enriching data with threat intelligence and business context.


  **Average Rating:** 3.9/5.0
  **Total Reviews:** 23
**How Do G2 Users Rate NetWitness Platform?**

- **Metadata Enrichment:** 8.3/10 (Category avg: 8.4/10)
- **Quality of Support:** 7.6/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 6.7/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind NetWitness Platform?**

- **Seller:** [NetWitness](https://www.g2.com/sellers/netwitness)
- **Year Founded:** 1997
- **HQ Location:** Bedford, MA
- **Twitter:** @Netwitness (1,623 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/netwitness-platform/ (186 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 54% Enterprise, 33% Mid-Market


#### What Are NetWitness Platform's Pros and Cons?

**Pros:**

- Investigation (2 reviews)
- Threat Detection (2 reviews)
- Centralized Management (1 reviews)
- Cybersecurity (1 reviews)
- Features (1 reviews)

**Cons:**

- Complex Implementation (2 reviews)
- Complexity (2 reviews)
- Complex Setup (2 reviews)
- Deployment Difficulties (2 reviews)
- Expertise Required (2 reviews)

### 13. [Corelight](https://www.g2.com/products/corelight/reviews)
  Corelight&#39;s Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detection (IDS), and PCAP functionality in a single solution and by providing security analysts with machine learning-assisted investigations and one-click-pivots from prioritized alerts to the evidence needed to investigate and remediate them. Network Detection and Response platforms monitor and analyze network traffic, delivering telemetry into existing SIEM, XDR, or SaaS-based solutions. Corelight’s platform is unique because our detections and visibility engineering are community driven—with continuous content creation from Zeek®, Suricata IDS, and other Intel communities. And our integration with CrowdStrike XDR enables cross platform (EDR+NDR) analytics. This provides you with the most complete network visibility, powerful analytics, and threat hunting capabilities, and accelerates investigation across your entire kill chain. Corelight also delivers a comprehensive suite of network security analytics that help organizations identify more than 75 adversarial TTPs across the MITRE ATT&amp;CK® spectrum including Exfiltration, Command and Control (C2), and Lateral Movement. These detections reveal known and unknown threats via hundreds of unique insights and alerts across machine learning, behavioral analysis, and signature-based approaches. CORELIGHT PRODUCTS + SERVICES Open NDR Platform Appliance, Cloud, Software, Virtual and SaaS Sensors IDS Fleet Manager Investigator Threat Hunting Platform Smart PCAP Corelight Training CERTIFICATIONS FIPS 140-2


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 20
**How Do G2 Users Rate Corelight?**

- **Metadata Enrichment:** 8.6/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.1/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.1/10 (Category avg: 8.8/10)

**Who Is the Company Behind Corelight?**

- **Seller:** [Corelight](https://www.g2.com/sellers/corelight)
- **Company Website:** https://www.corelight.com/
- **Year Founded:** 2013
- **HQ Location:** San Francisco, CA
- **Twitter:** @corelight_inc (4,217 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/corelight (464 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### What Are Corelight's Pros and Cons?

**Pros:**

- Comprehensive Security (2 reviews)
- Cybersecurity (2 reviews)
- Network Security (2 reviews)
- Security (2 reviews)
- Security Features (2 reviews)

**Cons:**

- Complex Coding (2 reviews)
- Complex Configuration (2 reviews)
- Complexity (2 reviews)
- Complex Setup (2 reviews)
- Learning Curve (2 reviews)

### 14. [Cisco Adaptive Wireless IPS Software](https://www.g2.com/products/cisco-adaptive-wireless-ips-software/reviews)
  Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fully integrated with the Cisco Unified Wireless Network, this solution delivers integrated visibility and control across the network, without the need for an overlay solution.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16
**How Do G2 Users Rate Cisco Adaptive Wireless IPS Software?**

- **Metadata Enrichment:** 8.5/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.2/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.3/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind Cisco Adaptive Wireless IPS Software?**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,419 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Who Uses This Product?**
  - **Company Size:** 63% Mid-Market, 25% Enterprise


### 15. [guardsix](https://www.g2.com/products/guardsix/reviews)
  guardsix is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). guardsix command center, a unified SecOps platform, enables organizations to effectively detect cyberattacks while ensuring compliance with various data regulations. By offering a robust framework for monitoring and managing security events, guardsix addresses the increasing need for advanced threat detection and regulatory adherence in today’s complex digital landscape. guardsix command center stands out by providing complete visibility across IT environments through the integration of multiple security technologies, including Security Information and Event Management (SIEM), Network Detection and Response (NDR), and Security Orchestration, Automation, and Response (SOAR). This integration allows organizations to monitor their systems holistically, ensuring that potential threats are identified and addressed promptly. Additionally, guardsix employs hypergraph technology, which connects detections from diverse sources, enabling users to determine whether an incident is part of a more extensive attack. This capability enhances situational awareness and improves incident response times. One of the key advantages of guardsix is its open, vendor- and platform-agnostic nature, allowing users to choose how and from where to ingest data. This flexibility is crucial for organizations that operate in heterogeneous environments, as it enables them to tailor their security solutions to fit their specific needs. Furthermore, guardsix automatically normalizes data into a common taxonomy, simplifying the analysis and utilization of ingested information. This feature ensures that users can easily derive insights from their data, regardless of its original format or source. guardsix also prioritizes compliance with major regulatory frameworks, including NIS2, Schrems II, HIPAA, GDPR, PCI-DSS, and SOX. By providing centralized logging and reporting capabilities, the platform facilitates adherence to security guidelines such as CERT-In, SOC 2 Type II, and ISO27001. This focus on compliance not only helps organizations avoid potential legal pitfalls but also enhances their overall security posture by ensuring that they meet industry standards and best practices. In summary, guardsix is a versatile cybersecurity solution that empowers MSSPs and CNI providers to detect threats effectively while maintaining compliance with regulatory requirements. Its integration of essential security technologies, flexible data ingestion options, and emphasis on compliance make it a valuable asset for organizations looking to strengthen their cybersecurity defenses.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 105
**How Do G2 Users Rate guardsix?**

- **Metadata Enrichment:** 8.9/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.6/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind guardsix?**

- **Seller:** [guardsix](https://www.g2.com/sellers/guardsix)
- **Company Website:** https://guardsix.com/
- **Year Founded:** 2001
- **HQ Location:** Copenhagen, Capital Region
- **LinkedIn® Page:** https://linkedin.com/company/guardsix (117 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 44% Mid-Market, 31% Small-Business


#### What Are guardsix's Pros and Cons?

**Pros:**

- Ease of Use (8 reviews)
- Log Management (5 reviews)
- Customer Support (4 reviews)
- Easy Integrations (4 reviews)
- Efficiency (4 reviews)

**Cons:**

- Poor Interface Design (3 reviews)
- UX Improvement (3 reviews)
- Complexity (2 reviews)
- Confusing Interface (2 reviews)
- Information Deficiency (2 reviews)

### 16. [ManageEngine ADAudit Plus](https://www.g2.com/products/manageengine-adaudit-plus/reviews)
  ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compliant. ADAudit Plus transforms raw and noisy event log data into real-time reports and alerts, enabling you to get full visibility into activities happening across your Windows Server ecosystem in just a few clicks. More than 10,000 organizations across the world trust ADAudit Plus to: 1. Instantly notify them about changes in their Windows Server environments. 2. Continuously track Windows user logon activity. 3. Monitor the active and idle time spent by employees at their workstations. 4. Detect and troubleshoot AD account lockouts. 5. Provide a consolidated audit trail of privileged user activities across their domains. 6. Track changes and sign-ins in Azure AD. 7. Audit file accesses across Windows, NetApp, EMC, Synology, Hitachi, and Huawei file systems. 8. Monitor file integrity across local files residing on Windows systems. 9. Mitigate insider threats by leveraging UBA and response automation. 10. Generate audit-ready compliance reports for SOX, the GDPR, and other IT mandates.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 29
**How Do G2 Users Rate ManageEngine ADAudit Plus?**

- **Metadata Enrichment:** 5.8/10 (Category avg: 8.4/10)
- **Quality of Support:** 7.3/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 6.7/10 (Category avg: 8.6/10)
- **Network Visibility:** 5.8/10 (Category avg: 8.8/10)

**Who Is the Company Behind ManageEngine ADAudit Plus?**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,412 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Who Uses This Product?**
  - **Company Size:** 48% Enterprise, 45% Mid-Market


#### What Are ManageEngine ADAudit Plus's Pros and Cons?

**Pros:**

- Reporting (3 reviews)
- Dashboard Usability (2 reviews)
- Features (2 reviews)
- Dashboard Design (1 reviews)
- Detailed Information (1 reviews)

**Cons:**

- Alert Management (1 reviews)
- Data Overload (1 reviews)
- Expensive (1 reviews)
- False Positives (1 reviews)
- High Resource Usage (1 reviews)

### 17. [Arista NDR](https://www.g2.com/products/arista-ndr/reviews)
  Arista NDR is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full forensics context. Powered by Ava, Arista&#39;s security expert system, the Arista NDR Platform combines federated machine learning, threat intelligence and human expertise. The platform analyzes billions of communications to autonomously discover, profile and classify every device, user and application on any network. Through automated hunting and investigation, Arista NDR uncovers malicious intent from insiders and external attackers alike. The company is ranked #1 for time to value because of its frictionless approach that delivers answers rather than alerts.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 21
**How Do G2 Users Rate Arista NDR?**

- **Metadata Enrichment:** 8.1/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.3/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.2/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind Arista NDR?**

- **Seller:** [Arista Networks](https://www.g2.com/sellers/arista-networks-39d4d864-54b5-4f9b-bebc-dc5cf72757ca)
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, US
- **Twitter:** @arista_channels (2,447 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/80069/ (5,422 employees on LinkedIn®)
- **Ownership:** NYSE:ANET

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Small-Business, 38% Mid-Market


### 18. [Vectra AI Platform](https://www.g2.com/products/vectra-ai-platform/reviews)
  The Vectra AI Platform helps security teams detect and stop real attacks that evade traditional security controls across network, identity, cloud, and SaaS environments. It provides real-time visibility into how attackers move through hybrid and multi-cloud environments, enabling teams to understand attack activity early and respond before incidents escalate. By correlating attacker behavior across the full attack lifecycle, the platform reduces alert noise and surfaces high-confidence threats that matter most. Analysts spend less time triaging isolated alerts and more time investigating complete attack stories with the context needed to take decisive action. Vectra AI unifies detection, investigation, and coordinated response across identity, endpoint, and network controls. Its approach is aligned with real-world defensive techniques, reflected in the highest number of vendor references in MITRE D3FEND and recognition as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response. Organizations worldwide rely on Vectra AI to detect attacks others miss and demonstrate measurable improvements in security operations.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 20
**How Do G2 Users Rate Vectra AI Platform?**

- **Metadata Enrichment:** 10.0/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.2/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 10.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Vectra AI Platform?**

- **Seller:** [Vectra AI](https://www.g2.com/sellers/vectra-ai)
- **Year Founded:** 2011
- **HQ Location:** San Jose, CA
- **Twitter:** @Vectra_AI (3,272 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1229716/ (662 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 75% Enterprise, 15% Mid-Market


#### What Are Vectra AI Platform's Pros and Cons?

**Pros:**

- Ease of Understanding (1 reviews)
- Ease of Use (1 reviews)


### 19. [B1 Platform by CloudCover](https://www.g2.com/products/b1-platform-by-cloudcover/reviews)
  A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 43
**How Do G2 Users Rate B1 Platform by CloudCover?**

- **Metadata Enrichment:** 8.5/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.3/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind B1 Platform by CloudCover?**

- **Seller:** [CloudCover, Inc.](https://www.g2.com/sellers/cloudcover-inc)
- **Year Founded:** 2007
- **HQ Location:** Minneapolis, US
- **LinkedIn® Page:** https://www.linkedin.com/company/1642753 (14 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Small-Business, 39% Mid-Market


### 20. [CyberShark SOC-as-a-Service](https://www.g2.com/products/cybershark-soc-as-a-service/reviews)
  CyberShark is a Security Operations Center as a Service (SOCaaS) solution designed to provide organizations with comprehensive cybersecurity monitoring and management. It offers real-time threat detection, incident response, and continuous security analysis to safeguard against evolving cyber threats. Key Features and Functionality: - 24/7 Monitoring: Continuous surveillance of networks and systems to detect and respond to security incidents promptly. - Threat Intelligence: Utilization of advanced analytics and threat intelligence to identify and mitigate potential risks. - Incident Response: Rapid response mechanisms to address and neutralize security breaches effectively. - Compliance Management: Assistance in meeting regulatory requirements and maintaining compliance through detailed reporting and analysis. - Scalability: Flexible solutions that can be tailored to fit the needs of businesses of various sizes and industries. Primary Value and Problem Solved: CyberShark addresses the critical need for robust cybersecurity by providing organizations with a cost-effective and efficient SOCaaS solution. It eliminates the necessity for in-house security operations centers, reducing overhead costs and resource allocation. By offering continuous monitoring and rapid incident response, CyberShark enhances an organization&#39;s security posture, ensuring protection against cyber threats and aiding in regulatory compliance.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 24
**How Do G2 Users Rate CyberShark SOC-as-a-Service?**

- **Metadata Enrichment:** 7.8/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.4/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 7.8/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.2/10 (Category avg: 8.8/10)

**Who Is the Company Behind CyberShark SOC-as-a-Service?**

- **Seller:** [BlackStratus](https://www.g2.com/sellers/blackstratus-7a7f354d-d55e-481b-a285-f6ad4a4c05de)
- **Year Founded:** 2016
- **HQ Location:** Brookhaven, Mississippi
- **Twitter:** @BlackStratusInc (2,325 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/blackstratus-inc-/ (23 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 44% Small-Business, 32% Mid-Market


### 21. [Progress Flowmon Platform](https://www.g2.com/products/progress-flowmon-platform/reviews)
  Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green infrastructure status, it helps NetOps teams to understand user experience (UX) while keeping the amount of data noise and analytical work to a minimum. The Flowmon solution is a part of the Progress product portfolio.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 24
**How Do G2 Users Rate Progress Flowmon Platform?**

- **Metadata Enrichment:** 8.3/10 (Category avg: 8.4/10)
- **Quality of Support:** 8.8/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 7.8/10 (Category avg: 8.6/10)
- **Network Visibility:** 7.5/10 (Category avg: 8.8/10)

**Who Is the Company Behind Progress Flowmon Platform?**

- **Seller:** [Progress Software](https://www.g2.com/sellers/progress-software)
- **Year Founded:** 1981
- **HQ Location:** Burlington, MA.
- **Twitter:** @ProgressSW (48,839 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/progress-software/ (4,207 employees on LinkedIn®)
- **Ownership:** NASDAQ:PRGS

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 52% Mid-Market, 24% Small-Business


### 22. [Cyber Hawk](https://www.g2.com/products/cyber-hawk/reviews)
  Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-detect critical changes in your network. Avoid the negative consequences of unplanned or unauthorized changes in your IT environment. Catch unauthorized log-in attempts, track suspicious changes to network settings, and identify anomalous user behavior


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 9
**How Do G2 Users Rate Cyber Hawk?**

- **Metadata Enrichment:** 9.0/10 (Category avg: 8.4/10)
- **Quality of Support:** 7.9/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 8.7/10 (Category avg: 8.6/10)
- **Network Visibility:** 9.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Cyber Hawk?**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,428 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 44% Mid-Market, 33% Enterprise


#### What Are Cyber Hawk's Pros and Cons?

**Pros:**

- Cloud Security (1 reviews)
- Detailed Analysis (1 reviews)
- Ease of Use (1 reviews)
- Insights (1 reviews)
- Monitoring (1 reviews)

**Cons:**

- Network Issues (1 reviews)
- Slow Loading (1 reviews)
- Slow Performance (1 reviews)

### 23. [LMNTRIX](https://www.g2.com/products/lmntrix/reviews)
  LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response – not incident response. Our approach turns inward and assumes that you’re already breached and that you’re continually going to be breached, so we take a pro-active, offensive, hunting, and adversarial pursuit stance as opposed to a reactive, defensive, legacy stance with analysts staring at a SIEM console wishing they could detect an APT. LMNTRIX Active Defense is a best in class Managed Detection &amp; Response (MDR) service that detects and responds to advanced threats that bypass perimeter controls. We combine deep expertise with cutting-edge technology, leading intelligence, and advanced analytics to detect and investigate threats with great speed, accuracy, and focus. The outcomes we deliver clients are validated breaches that are investigated, contained and remediated. All incidents are aligned to the kill chain and Mitre ATT&amp;CK frameworks and contain detailed investigative actions and recommendations that your organisation follows to protect against the unknown, insider threat and malicious attacker. Active Defense is made up of 3 elements: LMNTRIX GRID (XDR) – This is our cyber defence SaaS platform that provides a new utility model for enterprise security, delivering pervasive visibility, automated threat detection &amp; prevention, threat hunting, investigation, validation and unlimited forensic exploration on-demand and entirely from the cloud. It is a single investigative platform for insights into threats on enterprise, cloud, hybrid, and industrial control systems (ICS) networks. The LMNTRIX Grid delivers unique advantages over current network security solutions. It is a holistic and multi-vector platform with unlimited retention window of full-fidelity network traffic, innovative security visualizations, and the ease and cost-savings of an on-demand deployment model. LMNTRIX Technology Stack –This is our powerful proprietary threat detection stack that is deployed onsite, behind existing controls. It combines multiple threat detection systems, with deceptions everywhere, machine learning, threat intel, correlation, static file analysis, heuristics, and behavior and anomaly detection techniques to find threats in real-time. It decreases alarm fatigue by automatically determining which alerts should be elevated to security events, and reduces false positives by requiring consensus across detection. LMNTRIX Cyber Defense Centers - While these technologies are without peer, what sets us apart from the pack is our team of cybersecurity professionals who continually monitor our clients environments 24x7 while simultaneously hunting threats internally as well as monitoring developments on the deep and dark web. Our CDC&#39;s are a global network of cyber defense centers with highly trained and certified intrusion analysts who provide constant vigilance and on-demand analysis of your networks. Our intrusion analysts monitor your networks and endpoints 24x7, applying the latest intelligence and proprietary methodologies to look for signs of compromise. When a potential compromise is detected, the team performs an in- depth analysis on affected systems to confirm the breach. When data theft or lateral movement is imminent, our automated perimeter containment blocks attackers in their tracks while endpoint containment feature makes immediate reaction possible by quarantining affected hosts, whether they are on or off your corporate network, significantly reducing or eliminating the consequences of a breach.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 10
**How Do G2 Users Rate LMNTRIX?**

- **Metadata Enrichment:** 10.0/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.6/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 10.0/10 (Category avg: 8.6/10)
- **Network Visibility:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind LMNTRIX?**

- **Seller:** [LMNTRIX](https://www.g2.com/sellers/lmntrix)
- **Year Founded:** 2015
- **HQ Location:** Orange, California
- **Twitter:** @lmntrixlabs (75 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lmntrix (54 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 60% Mid-Market, 20% Enterprise


### 24. [Lumu](https://www.g2.com/products/lumu/reviews)
  A proficient cybersecurity operation requires a fast, precise response. Lumu lets you measure compromise in real time and automate the mitigation and remediation of confirmed compromise incidents.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 5
**How Do G2 Users Rate Lumu?**

- **Metadata Enrichment:** 9.6/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.6/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.2/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Lumu?**

- **Seller:** [Lumu Technologies](https://www.g2.com/sellers/lumu-technologies)
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 60% Small-Business, 20% Enterprise


### 25. [Open XDR Security Operations Platform](https://www.g2.com/products/open-xdr-security-operations-platform/reviews)
  The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8x improvement in MTTD and a 20x improvement in MTTR. The company is based in Silicon Valley. For more information, visit stellarcyber.ai.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 8
**How Do G2 Users Rate Open XDR Security Operations Platform?**

- **Metadata Enrichment:** 9.6/10 (Category avg: 8.4/10)
- **Quality of Support:** 9.0/10 (Category avg: 8.9/10)
- **Multi-Network Monitoring:** 9.2/10 (Category avg: 8.6/10)
- **Network Visibility:** 8.8/10 (Category avg: 8.8/10)

**Who Is the Company Behind Open XDR Security Operations Platform?**

- **Seller:** [STELLAR CYBER](https://www.g2.com/sellers/stellar-cyber-4d4425d1-14e9-4e8d-9a23-0fa3d6fc3901)
- **Year Founded:** 2017
- **HQ Location:** San Jose, California, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/stellarcyber (150 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Mid-Market, 25% Enterprise


#### What Are Open XDR Security Operations Platform's Pros and Cons?

**Pros:**

- Integrations (6 reviews)
- Easy Integrations (5 reviews)
- Visibility (5 reviews)
- Threat Detection (4 reviews)
- AI Automation (3 reviews)

**Cons:**

- Integration Issues (4 reviews)
- Alerting Issues (2 reviews)
- Alert Management (2 reviews)
- False Positives (2 reviews)
- Inefficient Alert System (2 reviews)


    ## What Is Network Detection and Response (NDR) Software?
  [Network Security Software](https://www.g2.com/categories/network-security)
  ## What Software Categories Are Similar to Network Detection and Response (NDR) Software?
    - [Security Information and Event Management (SIEM) Software](https://www.g2.com/categories/security-information-and-event-management-siem)
    - [Incident Response Software](https://www.g2.com/categories/incident-response)
    - [Intrusion Detection and Prevention Systems (IDPS)](https://www.g2.com/categories/intrusion-detection-and-prevention-systems-idps)
    - [Managed Detection and Response (MDR)  Software](https://www.g2.com/categories/managed-detection-and-response-mdr)
    - [Network Traffic Analysis (NTA) Software](https://www.g2.com/categories/network-traffic-analysis-nta)
    - [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)
    - [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr)

  
---

## How Do You Choose the Right Network Detection and Response (NDR) Software?

### What You Should Know About Network Detection and Response (NDR) Software

### What is Network Detection and Response (NDR) Software?

Network detection and response (NDR) software documents a company’s network activity while automating threat remediation and reporting cyber threats to IT and security teams. NDR enables an organization to consolidate IT security services into one solution and simplifies network protection.

NDR is critical because it provides an end-to-end view of network activity. For example, certain malicious activity may not be reflected in network logs but will be visible by network tools as soon as they interact with systems throughout the network.&amp;nbsp;

Since NDR software uses artificial intelligence (AI) and machine learning (ML) to analyze network traffic, it is highly adept at detecting malicious behavior as well as reporting and remediating such activity in real time.&amp;nbsp;

### What are the Common Features of Network Detection and Response (NDR) System?

NDR system usually includes the following:

**AI and ML:** NDR uses AI and ML in its software solution. IT and security professionals can use the data to develop streamlined discovery and response workflows across an organization’s network.

**Automated threat detection:** When traffic behavior deviates from normal functionality, an NDR solution detects the issue and automatically assists in an investigation. NDR software includes or integrates with other solutions that automate incident response processes to minimize the threat’s impact.

### What are the Benefits of Network Detection and Response (NDR)&amp;nbsp; Software?

There are several benefits to using NDR software.

**Automatically detects anomalies** : NDR software automatically detects anomalies in network traffic by applying non-signature-based detection techniques and using behavioral analytics, AI, and ML.

**Monitors all traffic flows** : NDR solutions monitor all traffic entering or exiting the network so there is visibility to identify and mitigate security incidents, regardless of where a threat comes from. Giving this end-to-end view of the network offers IT and security teams greater visibility across the network to mitigate traffic threats.

**Analyzes network in real time** : NDR analyzes an organization’s network for threats in real time or near real time. It provides timely alerts for IT and security teams, improving incident response times.

**Narrows down incident response** : NDR solutions attribute malicious behavior to specific IP addresses and perform forensic analyses through AI and ML to determine how threats have moved across a network environment. This leads to faster, more efficient incident response.&amp;nbsp;

**Who Uses Network Detection and Response (NDR) Software?**

**Network IT and cybersecurity staff:** These workers use NDR software to observe network traffic and detect anomalies related to user behavior.

**Industries** : Organizations in all industries, especially technology or highly sensitive data-oriented sectors like financial services, seek NDR solutions to help protect their networks.

### What Are Alternatives to Network Detection and Response (NDR) Software?

Network traffic analysis (NTA) software and endpoint detection response (EDR) software are alternatives to NDR software.

[Network traffic analysis (NTA) software](https://www.g2.com/categories/network-traffic-analysis-nta): NTA software is similar to NDR tools in that it monitors network traffic and looks for suspicious activity while providing real-time analysis and alerting IT administrators. The main difference is that it also analyzes network performance and pinpoints reasons for slow downloads.&amp;nbsp;

[Endpoint detection &amp; response (EDR)](https://www.g2.com/categories/endpoint-detection-response-edr)[software](https://www.g2.com/categories/endpoint-detection-response-edr): EDR tools are similar to NDR solutions, focusing on network activity. It detects, investigates, and removes malicious software penetrating a network’s devices. These tools give greater visibility of a system’s overall health, including each specific device’s state. Companies use these tools to mitigate endpoint penetrations quickly and prevent data loss, theft, or system failures.&amp;nbsp;

### Challenges with Network Detection and Response (NDR) Software

There are some challenges IT teams can encounter with NDR software.

**Sophisticated hackers:** With high volumes of data traveling across an organization’s network, hackers create more sophisticated threats that can hide their tracks and avoid detection by blending in with traffic patterns. Attackers can also make threats move in small and infrequent batches to avoid detection.

**Budget constraints:** As hackers become more sophisticated, organizations must keep their NDR solutions up-to-date to keep up with the latest threats. Budget constraints could prevent IT and security teams from doing so.

### How to Buy Network Detection and Response (NDR) Software

#### Requirements Gathering (RFI/RFP) for Network Detection and Response (NDR) Software&amp;nbsp;

If an organization is just starting and looking to purchase NDR software, G2 can help.

The manual work necessary in security and compliance causes multiple pain points. If the company is large and has a lot of networks, data, or devices in its organization, it may need to shop for scalable NDR&amp;nbsp; solutions. Users should think about the pain points in their security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use this software and if they currently have the skills to administer it.&amp;nbsp;

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The list is a detailed guide that includes necessary and nice-to-have features, including budget features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the deployment scope, producing an RFI, a one-page list with bullet points describing what is needed from NDR software, might be helpful.

#### Compare Network Detection and Response (NDR) Software Products

**Create a long list**

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

**Create a short list**

From the long list of vendors, it is helpful to narrow the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list, businesses can produce a matrix to compare the features and pricing of the various solutions.

**Conduct demos**

To ensure a comprehensive comparison, the user should demo each solution on the short list with the same use cases. This allows the business to evaluate like for like and see how each vendor stacks up against the competition.&amp;nbsp;

#### Selection of Network Detection and Response (NDR) Software

**Choose a selection team**

Before getting started, creating a winning team that will work together throughout the process, from identifying pain points to implementation, is crucial. The selection team should include organization members with the right interests, skills, and participation time.&amp;nbsp;

A good starting point is to aim for three to five people who fill roles such as the primary decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. The vendor selection team in smaller companies may have fewer participants who will multitask and take on more responsibilities.

**Compare notes**

The selection team should compare notes, facts, and figures noted during the process, such as costs, security capabilities, and alert and incident response times.

**Negotiation**

Just because something is written on a company’s pricing page does not mean it&#39;s final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

**Final decision**

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and received, the buyer can be confident that the selection was correct. If not, it might be time to return to the drawing board.

### What Does Network Detection and Response (NDR) Software Cost?

NDR software is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization&#39;s specific requirements. Once NDR software is purchased, deployed, and integrated into an organization’s security system, the cost could be high, so the evaluation stage of selecting the right tool is crucial.&amp;nbsp;

The chosen NDR vendor should continue to provide support for the platform with flexibility and open integration. Pricing can be pay-as-you-go, and costs may also vary depending on whether unified threat management is self-managed or fully managed.

#### Return on Investment (ROI)

As organizations consider recouping the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency. In the long run, the investment must be worth preventing downtime, loss of revenue, and any reputation damage that a security breach would cause.



    
