Given the numerous and advanced cyber threats, IT security teams face the challenge of ensuring active, fast and comprehensive cyber detection and response for enterprises. To achieve this goal, a wide variety of threat detection and response tools can be used to detect and report attack activities in a timely manner and thus increase cyber resilience comprehensively and sustainably. Network Detection & Response (NDR) plays a key role here and - supplemented by other services - should be a permanent fixture in companies' cyber defense strategies.

Network-based security approach: Network Detection & Response (NDR) as part of the cyber defense strategy

With the network-based security approach Network Detection and Response (NDR), the entire data traffic of a company can be continuously monitored and analyzed – based on static rules, machine learning and threat intelligence. The solution includes all internal data traffic as well as external communication, thus taking into account sources such as client and server systems, network components, but also IoT sensors or OT devices. The thus achieved deep understanding of normal network behavior leads to a reliable and fast identification of anomalies.

The 6 most important features of NDR are:

  • Network traffic monitoring: an NDR solution monitors and analyzes network traffic for potential threats. This can be done by using technologies such as intrusion detection systems (IDS) and intrusion prevention systems (IPS).
  • Behavioral analysis: an NDR solution uses machine learning algorithms to analyze the behavioral pattern of network traffic and detect anomalies that may indicate a potential threat.
  • Automatic response: an NDR solution can automatically respond to detected threats by, for example, disconnecting network connections or implementing rules in the firewall system.
  • Integrity protection: An NDR solution can also ensure that the integrity of the network is maintained by monitoring changes to configurations and by monitoring unauthorized access to network resources.
  • Reporting and forensics: An NDR solution provides the ability to generate detailed reports and forensics data that can help investigate security incidents and identify attackers.

However, to realize effective, sustainable and reliable threat detection, NDR needs to work in tandem with other solutions.

Detect and respond to network threats

By systematically and automatically monitoring traffic and network behavior, NDR solutions learn “normal behavior.” If patterns deviating from this learned behavior occur, such as suspicious access to systems or data exfiltration, the NDR solution automatically triggers an alert.

Ideally, the alerts should be collected centrally, for example in a security information and event management (SIEM) system, and correlated with other data, for example from an endpoint detection and response (EDR) solution. With the help of the SIEM, the cyber defense analyst can analyze irregularities that occur centrally and efficiently and, if necessary, respond to them in a targeted manner. The support of a SOAR system (Security Orchestration Automation and Response) is advantageous here.

The result of the interaction of these detection and response solutions is a significantly improved level of IT security for companies, through which it can be achieved that even sophisticated cyber attacks can be identified and defended against at an early stage.

Here’s how NDR can support SIEM

Both NDR and SIEM collect and share information and work together on that basis with the overarching goal of detecting, verifying and responding to threats.

Once an attack is identified, an NDR solution can automatically respond by isolating affected devices to prevent the spread of the attack and clean up affected areas. Furthermore, the NDR solution makes all collected information available to the SIEM system.

Specifically, NDR supports the SIEM by:

  • Collecting and analyzing connection data from network traffic
  • Providing an immutable data source
  • Optimizing complete, comprehensive reports
  • Covering log gaps
  • Log analysis as well as aggregation and detection of behavioral threats

The SIEM uses this information, along with other events from various security devices and applications in real time, and correlates this data to detect potential threats and generate alerts. Cyber defense analysts also use the information gathered by NDR to, in turn, adjust detection rules in the SIEM to better detect and defend against future attacks.

Complementing NDR with EDR

The focus of Endpoint Detection & Response (EDR) solutions is to increase the visibility of anomalies at the endpoint: protection occurs directly on endpoints, not at the network perimeter. Endpoints – any device connected to a network – are potential gateways for cyber threats. With EDR, endpoint activity is captured, logged and analyzed in real time. As such, EDR solutions are a valuable part of the cyber defense toolset, but their focus on endpoints means they are not able to monitor network traffic and activity that occurs outside of the endpoint. This type of monitoring and analysis requires a Network Detection and Response (NDR) solution. As a result, the technologies complement each other ideally, resulting in a more detailed security picture through the correlation of the information gathered and the ability to comprehensively detect and defend against attacks.

Conclusion

SOC teams still rely heavily on endpoint detection and response (EDR) and security information and event management (SIEM) tools in their work. However, these tools cannot provide visibility into traffic and thus only provide a small, very limited slice of security-related activity. Only when supplemented with an NDR can cyberattacks be detected, analyzed, and targeted at an early stage. The combination of NDR, EDR and SIEM makes it possible to detect threats and attacks at the application, network and endpoint level and to react immediately.

Norbert Nitsche · Author

Managing Cyber Defense Consultant

Als Managing Cyber Defense Consultant leitet Norbert Nitsche das Cyber Defense Center der SECUINFRA. In dieser Rolle verantwortet er die 24/7 Managed Cyber Defense Services, zu denen u.a. (Co-) Managed SIEM/XDR, Compromise Assessment sowie Digital Forensics & Incident Response zählen.

Als Managing Cyber Defense Consultant leitet Norbert Nitsche das Cyber Defense Center der SECUINFRA. In dieser Rolle verantwortet er die 24/7 Managed Cyber Defense Services, zu denen u.a. (Co-) Managed SIEM/XDR, Compromise Assessment sowie Digital Forensics & Incident Response zählen. Gemeinsam mit seinem hochmotivierten Analystenteam sorgt Norbert Nitsche für eine erfolgreiche Cyber Defense bei den Kunden der SECUINFRA.

Managing Cyber Defense Consultant

As Managing Cyber Defense Consultant, Norbert Nitsche heads SECUINFRA's Cyber Defense Center. In this role, he is responsible for the 24/7 Managed Cyber Defense Services, which include (Co-) Managed SIEM/XDR, Compromise Assessment and Digital Forensics & Incident Response.

As Managing Cyber Defense Consultant, Norbert Nitsche heads SECUINFRA's Cyber Defense Center. In this role, he is responsible for the 24/7 Managed Cyber Defense Services, which include (Co-) Managed SIEM/XDR, Compromise Assessment and Digital Forensics & Incident Response. Together with his highly motivated team of analysts, Norbert Nitsche ensures a successful Cyber Defense for SECUINFRA's customers.

Ramon Weil · Author

Founder & CEO

Ramon Weil ist Gründer und Geschäftsführer der SECUINFRA GmbH. Seit 2010 hat er SECUINFRA zu einem der führenden Unternehmen im Bereich der Erkennung, Analyse und Abwehr von Cyberangriffen in Deutschland entwickelt.

Ramon Weil ist Gründer und Geschäftsführer der SECUINFRA GmbH. Seit 2010 hat er SECUINFRA zu einem der führenden Unternehmen im Bereich der Erkennung, Analyse und Abwehr von Cyberangriffen in Deutschland entwickelt. Vor der Gründung von SECUINFRA war Ramon mehr als 20 Jahre im Bereich IT & IT-Security tätig. Unter anderem hat er bei Siemens im Security Operation Center (SOC) gearbeitet, den Back Level Support für IT-Security Produkte bei Siemens aufgebaut und weltweit IT- Security Projekte umgesetzt und geleitet. Von 2006 bis zur Gründung von SECUINFRA hat Ramon das IT-Security Geschäft für Siemens und später Nokia Siemens Networks (NSN) in der Region Asia Pacific (APAC) aufgebaut. Neben zahlreichen IT-Security Produkt-Zertifizierungen ist er seit 2006 CISSP und seit 2010 CISM.

Founder & CEO

Ramon Weil is founder and managing director of SECUINFRA GmbH. Since 2010, he has developed SECUINFRA into one of the leading companies in the field of detection, analysis and defense against cyber attacks in Germany.

Ramon Weil is founder and managing director of SECUINFRA GmbH. Since 2010, he has developed SECUINFRA into one of the leading companies in the field of detection, analysis and defense against cyber attacks in Germany. Before founding SECUINFRA, Ramon worked for more than 20 years in the field of IT & IT security. Among other things, he worked at Siemens in the Security Operation Center (SOC), established the back level support for IT security products at Siemens and implemented and managed IT security projects worldwide. From 2006 until the foundation of SECUINFRA, Ramon built up the IT Security business for Siemens and later Nokia Siemens Networks (NSN) in the Asia Pacific (APAC) region. In addition to numerous IT security product certifications, he has been a CISSP since 2006 and a CISM since 2010.
Beitrag teilen auf: