PT Network Attack Discovery
PT Network Attack Discovery
01

Overview

PT Network Attack Discovery is a network detection and response (NDR/NTA) system for detecting attacks on the perimeter and inside your network. The system makes hidden threats visible, detects suspicious activity even in encrypted traffic, and helps investigate incidents.

PT Network Attack Discovery 12.1 offers a 3x increase in indexing speed

The traffic analysis system from Positive Technologies has increased its ability to handle peak loads without requiring additional hardware

Detects malicious activities in east/west traffic

PT NAD analyzes both north/south and east/west traffic and detects lateral movement, attempts to exploit vulnerabilities, and attacks against end users on the domain and internal services.

How PT NAD maps to MITRE ATT&CK

Learn how the network detection and response system PT Network Attack Detection can identify 117 adversary techniques described in MITRE ATT&CK.

02

PT NAD detects

Detects even modified malware

PT NAD alerts about all dangerous threats and detects even modified versions of malware. To describe the full range of cyberthreats, our experts constantly explore the latest malware samples and hacker tools, techniques, and procedures. Each rule they create covers an entire malware family.

03

How it works

PT NAD captures and analyzes traffic on the perimeter and inside infrastructure. This allows for the detection of hacker activity at the earliest stages of network penetration, as well as during attempts to gain a foothold on the network and develop the attack.

Confidential

PT NAD is an on-premise solution. All data is stored on client infrastructure, never leaving the corporate perimeter. Information on attacks and damage is not transmitted to the outside, minimizing reputational risks.

04

Use scenarios

Security policy compliance

Detection of attacks on the perimeter and inside the network

Investigation of attacks

Threat hunting

05

Key features

Attack detection

The system informs of incidents and automatically assesses how dangerous they are. The dashboard provides key information about all attacks: how many, which types, the degree of danger, and when they occurred. Click to view details for any attack.

Response at a glance

Information for each attack shows the affected hosts, event time, session data, and hacker tools, techniques, and procedures (TTPs) per the MITRE ATT&CK classification. With attack staging information, you can take the right surgical measures to get the job done.

Learn about new attacks and threats in a single feed

Activity feed collects a list of identified threats in one place, combines messages about similar activities into one, and allows you to manage them. You can mark the issue as resolved or no longer track such activity.

Monitor network hosts

PT NAD users see when a new host appears on the network, as well as an application protocol or the OS has changed. This data can help identify suspicious activity, too.

Session filtering

Filtering sessions offers a way to look for malicious activity, indicators of compromise, and configuration errors. PT NAD can quickly sort through sessions by up to 1,200 parameters and display detailed information for each.

06

Extra materials

Key product information PT NAD brief

General

Research

Thinking about the best way to protect your company?

Contact us.

During the consultation we'll propose a solution precisely tailored to your organization.

 

General questions
We're happy to answer any questions you may have.
Partnership
Join us in making the world a safer place.
Request a pilot
Test drive our solutions with a customized pilot program.