Network Detection and Response (NDR) uses artificial intelligence and other analytics to identify suspicious network activity outside of the norm, which may be an indicator of a cyber attack in progress. FortiNDR enables full-lifecycle network protection, detection, and response. It covers both network traffic and file-based analysis, along with root-cause identification. New threats can be identified by FortiNDR so you can instantly adapt threat containment and protection to new attacks.
Artificial intelligence in action
In addition to dynamically profiling an organization’s network activity, FortiNDR also conducts file-based analysis. It comes pre-trained with more than 6+ million malicious and safe features that can identify IT- and OT-based malware and classify it into threat categories. These features can also accurately pinpoint patient zero and lateral spread of multi-variant malware by analyzing the entire malware movement.
Virtual security analyst
FortiNDR includes a virtual security analyst capability (formerly known as FortiAI) that can operate in unsupervised mode, helping lean SecOps teams fully analyze and investigate new threats within the shortest period of time. Because of our deep neural network’s innate ability to self-learn, it continuously adapts to the evolving cyber-threat landscape including AI-powered cyberattacks.