Why top SOC teams are shifting to Network Detection and Response
Briefly

SOC teams face a serious challenge as traditional cybersecurity tools struggle against advanced adversaries who evade detection. These 'invisible intruders' can compromise networks for extended periods, leading to significant data breaches. The average dwell time of attackers is around 21 days, with some staying undetected for years. Security professionals are increasingly employing Network Detection and Response (NDR) solutions to gain better visibility and discover hidden threats. Modern attackers utilize techniques like living-off-the-land and lateral movement, emphasizing the need for advanced detection strategies to combat evolving threats.
"We hear this story repeatedly from security teams," says Vince Stoffer, field CTO at Corelight, the fastest growing provider of NDR solutions. "They install an NDR solution and immediately discover basic network visibility issues or suspicious activity that's been undiscovered on their networks for months - sometimes years."
The average dwell time for attackers - the period between initial compromise and detection - still hovers around 21 days in many industries, with some breaches remaining undiscovered for years.
Today's sophisticated threat actors don't rely on malware with known signatures or behaviors that trigger endpoint alerts. Instead, they use living-off-the-land techniques, leveraging legitimate system tools like PowerShell.
An advanced adversary has been quietly moving through your systems, carefully avoiding detection. They've stolen credentials, established backdoors, and exfiltrated sensitive data, all while your dashboards showed nothing but green.
Read at The Hacker News
[
|
]