Network Threat Analytics

Identify and eradicate suspicious and malicious network activity

Companies of all sizes continue to struggle to successfully combat the myriad of cyber threats targeting their environments regardless of their defensive capabilities or Enterprise security posture. Adversaries leverage sophisticated tactics and techniques to conduct their campaigns and are rarely deterred or even detected. Attacks of this nature are specifically designed to evade the most commonly used security defenses by employing a variety of obfuscation methods and techniques that are almost always embedded within a file to conceal their presence.



Traditional signature-based intrusion detection solutions are predominantly reactive, and rely upon predefined pattern matching to identify intrusions. Signature maintenance creates an operational burden at a time when cybersecurity expertise is scarce and alert fatigue is high.

NDR works from an incomplete corpus - only analyzing network logs. It is complex to use, requiring ML training across multiple independent data sources to identify and confirm malicious activity with fidelity. Integration and data set tuning make NDR costly to deploy and maintain.


FDR Network Threat Analytics detects and responds to cyber threats targeting enterprise networks. Specifically, it is designed to perform analysis and detection by deeply examining network traffic for exploitation techniques, intrusion attempts, malicious actors, and suspicious behavior.

Further, FDR Network Threat Analytics automates complex threat hunting with its own intrusion detection, intrusion analysis, incident response, and event triage. Advanced algorithms leverage supervised classifiers and unsupervised clusters designed to query vast amounts of data, discover patterns, and generate insights. It’s also designed to monitor inbound and outbound network traffic leveraging our patented Deep File Inspection (DFI), Machine Learning (ML), RetroHunting, Artificial Intelligence (AI) technologies, sandbox integrations, and multi-scanning technologies. These capabilities are interwoven within FDR to accurately alert on malicious network activity, speed up investigation, and target forensic analyses - all with the goal of rapidly locating root cause, eradicating attacker footprint, and executing mitigation.

The Advantages of FDR Network Threat Analytics

Full Visibility of Traffic

Complete intrusion analysis with patented Deep File Inspection (DFI), Machine Learning (ML), and multi-scan technologies, which are designed to provide end-to-end visibility, detection-in-depth, intrusion analysis, and incident response.

High Performance Network Inspection

Monitoring network traffic at throughput speeds up to 40Gb per second and performing session analysis leveraging behavioral and advanced analytical techniques, such as machine learning, to identify and respond to anomalous suspicious behavior.

Empower Threat Hunters

Built-in incident response, intrusion analysis, remediation, event triage, and breach containment, which alleviate investigative workflows for the SOC team. Our platform provides the ability to proactively track and hunt for emerging threats and intrusions targeting your environment. Launch broader and deeper investigations of incidents detected and hunt retrospectively for undetected threats.

Iceberg of Network Inspection

Iceberg of inspection provides inspection of networks at carrier-class speeds. It also offers 360-degree continuous monitoring that includes email (both corporate accounts and webmail), documents accessed, and web applications. It captures and retains evidence of incidents for historical forensic analysis.

Network Data Loss Prevention (DLP)

Protect critical data with our integrated DLP capability, which performs inspection of all files' content and context to identify data exfiltration and ensure sensitive information never leaves your network boundaries.

Advanced Threat Coverage

Cloud-assisted analytical platform that provides real-time security protection using a combination of multi-scan technologies such as Deep File Inspection (DFI), Multi-AV scanning, threat reputation, behavioral analytics, and advanced malware prevention.