Logpoint NDR (Network Detection and Response) is a security solution that monitors network traffic to detect and respond to threats that may bypass traditional endpoint security measures. The platform uses AI and machine learning to analyze network activity patterns and identify malicious behavior in real-time. The solution features "Chain of Events" technology that connects seemingly unrelated security events to reveal hidden attack patterns. This AI-powered capability helps security teams focus on genuine threats by reducing alert noise and highlighting actual attack chains rather than individual alerts. Logpoint NDR operates without requiring agent deployment on endpoints, reducing operational overhead while providing visibility into network-based threats. It can detect various threats including malware, ransomware, and insider threats as they move across the network. The platform can be integrated with Logpoint SIEM to combine network traffic analysis with log data for more comprehensive security coverage. This integration enables security teams to correlate network-based detections with log-based evidence for improved threat hunting and incident response. Logpoint NDR helps organizations predict attacker movements by identifying tactics and techniques indicative of evolving attack chains, allowing for proactive threat prevention rather than just reactive response.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
FingerprintX is a standalone utility for service discovery on open ports.
An open source platform for secure remote access management with granular access control and fast speeds.
A private network system utilizing WireGuard for enhanced networking capabilities.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.