The ultimate defense from within

Network Detection and Response (NDR) is a security solution used to detect and prevent malicious network activity, investigate and perform forensics to determine root cause, and then respond and mitigate. Therereby protecting organizations against cyber threats.

 

Implementing NDR will give  organizations greater visibility into what is actually on the network as well as all activities. In turn, this will enable security teams to identify and stop suspicious network activity rapidly and minimize its impact on a daily business.

What DOES NDR DO?

Port-IT NDR silently monitors the vessels network, watching for malicious events or suspicious traffic, even between devices only used internally, such as the VDR and a gues PC. Once this kind of traffic is detected the solution will deploy forensics, mitigate the issue and instantly informs the Port-IT Security Operations Center (SOC) team. 

 

To detect malicious kinds of traffic it uses a combination of artificial intelligence, machine learning and userdefined policies, offering intelligent layers on which the configuration can be strengthened.

 

Port-IT NDR uses NTA, Network Traffic Analysis. NTA does not only monitor the network perimeter, but more importantly all traffic within the network for complete coverage. NDR detects threats across the entire network, including BYOD & IoT devices and even advanced unknown attacks that other solutions have missed.

Example of a local network detection

Port-IT NDR Icon_los wit

The NDR sees internal traffic – a UTM cannot

The Port-IT NDR solution seamlessly integrates with all existing security products of the Port-IT portfolio, providing the shipping companies with a full security-minded overview of all network elements of the vessel. Received data is monitored 24/7 and analyzed by a team of maritime trained network/security engineers.
Top-of-the-line A.I. and machine learning
Integrates with existing firewall
Full visibility including BYOD & IoT
Can be integrated with Active Directory in order to identify users in your network
Identify events in multiple locations from one central point
Complimentary to existing security tools on board.

Request a live demo