Security Orchestration, Automation and Response (SOAR)

Drive Up SOC ROI With Intelligent Orchestration

SOCs are complex entities by virtue of a myriad of systems, tools, and procedures used to acquire, identify, analyze, act against, and hunt threat actors and malware. Alerts, logs, PCAPs, files, threat intel and more need to be exchanged easily and rapidly to maximize the output of expensive human and machine power. SOAR aims to organize incident analysis and response procedures in a digital workflow format.



While SOAR is in wide use by a number of organizations today, it still requires time, energy, and expertise to install and configure into a SOC environment. It takes time to achieve effective security orchestration - which connects and integrates internal and external tools via built-in or custom integrations and APIs across vulnerability scanners, endpoint protection products, end-user behavior analytics, firewalls, IDS/IPS, SIEMs, and external threat intelligence feeds. It also takes time to build security automation - which replaces manual processes like vulnerability scanning, log analysis, ticket checking and auditing capabilities with automated processes. Playbooks - which automate actions - are key to the latter.


FDR delivers on the promise of SOAR, but without the need for complex integrations and playbooks. FDR brings to bear a 'virtual analyst' that goes to work instantly, backed by the collective knowledge of InQuest Labs, DFI, RetroHunting and more. There is no need for staff to tune it to your IT environment, or spend inordinate amounts of time plumbing it into your tool chain. FDR instantly automates and scales your SOC through its automated decision-making engine, bi-directional orchestration with multi-scanning and sandbox solutions, unique threat intelligence sources, and a seasoned signature development team augmented by machine learning.

The Advantages of Network Detection & Response

Full Visibility of Traffic

Complete intrusion analysis with patented Deep File Inspection (DFI), Machine Learning (ML), and multi-scan technologies, which are designed to provide end-to-end visibility, detection-in-depth, intrusion analysis, and incident response.

High Performance Network Inspection

Monitoring network traffic at throughput speeds up to 40Gb per second and performing session analysis leveraging behavioral and advanced analytical techniques, such as machine learning, to identify and respond to anomalous suspicious behavior.

Empower Threat Hunters

Built-in incident response, intrusion analysis, remediation, event triage, and breach containment, which alleviate investigative workflows for the SOC team. Our platform provides the ability to proactively track and hunt for emerging threats and intrusions targeting your environment. Launch broader and deeper investigations of incidents detected and hunt retrospectively for undetected threats.

Iceberg of Network Inspection

Iceberg of inspection provides inspection of networks at carrier-class speeds. It also offers 360-degree continuous monitoring that includes email (both corporate accounts and webmail), documents accessed, and web applications. It captures and retains evidence of incidents for historical forensic analysis.

Powered by Machine Learning (ML)

Advanced network intrusion detection empowered by machine learning, expert analysis, and threat intelligence to rapidly identify emerging threats, accelerating triage and response.  Augmenting human analysts to tackle the ever-increasing talent gap. It uses advanced algorithms that leverage supervised classifiers and unsupervised clusters designed to query vast amounts of data, discover patterns, and generate insights.

Advanced Threat Coverage

Cloud-assisted analytical platform that provides real-time security protection using a combination of multi-scan technologies such as Deep File Inspection (DFI), Multi-AV scanning, threat reputation, behavioral analytics, and advanced malware prevention.