{"id":1043,"date":"2024-12-03T15:21:28","date_gmt":"2024-12-03T15:21:28","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1043"},"modified":"2024-12-03T15:21:28","modified_gmt":"2024-12-03T15:21:28","slug":"ndr-in-the-era-of-cloud-and-hybrid-environments-why-its-essential","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1043","title":{"rendered":"NDR in the Era of Cloud and Hybrid Environments: Why It\u2019s Essential"},"content":{"rendered":"<div class=\"elementor elementor-34400\">\n<div class=\"elementor-element elementor-element-0a7d520 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-ca4f10e elementor-blockquote--skin-boxed elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t&#8220;The PwC Cybersecurity Outlook Report reveals that 39% of UK senior executives expect cloud-related threats to significantly impact their organizations this year, surpassing traditional threat concerns.&#8221;\t\t\t<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-59a1a94 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW99253642 BCX0\"><span class=\"NormalTextRun SCXW99253642 BCX0\">With cloud infrastructures expanding across private, public, hybrid, and multi-cloud models, effective security monitoring is essential. Gartner\u2019s 2024 <\/span><\/span><span class=\"TextRun SCXW99253642 BCX0\"><span class=\"NormalTextRun SCXW99253642 BCX0\">Hype Cycle for Workload and Network Security<\/span><\/span><span class=\"TextRun SCXW99253642 BCX0\"><span class=\"NormalTextRun SCXW99253642 BCX0\"> suggests that NDR solutions are becoming critical in these diverse environments and could reach widespread adoption within the next two to five years. This trend underscores the importance of <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/what-is-ndr-network-detection-and-response\/\">NDR<\/a> for visibility and rapid threat detection in today\u2019s complex cloud landscapes (see Figure 1).<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW99253642 BCX0\"><br \/><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5164dea elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFig 1: 2024 Hype Cycle for Workload and Network Security <\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1f5cc8a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-72b7886 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What Is Cloud Network Detection and Response (NDR), and Why Is It So Important?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cfe8914 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Cloud network security refers to the strategies, controls, and technologies that protect cloud-based systems and data from threats. Traditional methods often struggle to keep up with the dynamic nature of cloud networks, where workloads, applications, and resources are continually changing. This is where <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">NDR solutions<\/a> make an impact, offering deep visibility into network traffic, detecting unusual patterns, and automating responses across cloud-native environments.\u00a0<\/p>\n<p>By continuously monitoring network activity, cloud NDR adapts to these unique architectures, identifying risks in real time\u2014even within 75% of traffic that is encrypted. It offers the deep visibility required to spot unusual patterns, mitigate potential risks, and maintain a high level of security across cloud services.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a619543 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What Detection and Response Mechanisms Does NDR Use for Cloud Threats?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f36b873 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>NDR solutions are equipped with advanced detection and response capabilities for common cyber threats, especially in cloud-native NDR systems. Let\u2019s look at some specific examples:<span>\u00a0<\/span><\/p>\n<p><span>Denial of Service (DoS) Attacks<\/span>\u00a0<br \/>NDR tools can identify unusual spikes in traffic that could signal a denial-of-service attack. By establishing thresholds based on normal traffic behavior, NDR solutions can alert teams early, often before significant service disruptions occur.\u00a0<span>Data Breaches<\/span>\u00a0<br \/>Continuous monitoring means NDR can spot unauthorized access attempts or signs of unusual <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-exfiltration\/\">data exfiltration<\/a>\u2014both indicators of a <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/what-is-data-breach\/\">data breach<\/a>. When NDR detects such activity, immediate alerts enable teams to respond before the breach escalates.\u00a0<span>Other Malicious Activities<\/span>\u00a0<br \/><span>Leveraging <\/span><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/using-machine-learning-for-threat-detection\/\">machine learning models<\/a><span>, NDR solutions identify patterns associated with known threats and adapt to evolving attack tactics. This adaptability is essential in today\u2019s cloud environments, where <\/span>malicious activities<span> continuously evolve, and rapid, real-time responses are crucial.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aeb0cdf e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-668f7e7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What Key Challenges Does NDR Face in Monitoring Cloud Network Traffic?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2e98f61 elementor-blockquote--skin-boxed elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t&#8220;PwC reports that over a quarter of global CFOs faced data breaches costing more than $1 million in recent years, emphasizing the urgent need for enhanced NDR solutions in today\u2019s hybrid cloud environments.&#8221; \t\t\t<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e52f72e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW45924370 BCX0\"><span class=\"NormalTextRun SCXW45924370 BCX0\">Monitoring <\/span><\/span><span class=\"TextRun SCXW45924370 BCX0\"><span class=\"NormalTextRun SCXW45924370 BCX0\">network traffic<\/span><\/span><span class=\"TextRun SCXW45924370 BCX0\"><span class=\"NormalTextRun SCXW45924370 BCX0\"> in <\/span><\/span><span class=\"TextRun SCXW45924370 BCX0\"><span class=\"NormalTextRun SCXW45924370 BCX0\">cloud and hybrid environments<\/span><\/span><span class=\"TextRun SCXW45924370 BCX0\"><span class=\"NormalTextRun SCXW45924370 BCX0\"> comes with unique challenges:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4b34288 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Limited Visibility and Control<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-580b8fa elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\">Cloud resources are often spread across various regions, making it hard to <\/span><span class=\"NormalTextRun SCXW193635702 BCX0\">maintain<\/span><span class=\"NormalTextRun SCXW193635702 BCX0\"> visibility over <\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\">network performance<\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\"> and security. <\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\">Continuous monitoring<\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\"> helps, <\/span><span class=\"NormalTextRun SCXW193635702 BCX0\">but <\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\">distributed infrastructure<\/span><\/span><span class=\"TextRun SCXW193635702 BCX0\"><span class=\"NormalTextRun SCXW193635702 BCX0\"> and rapidly changing resources require sophisticated tools to provide full visibility.<\/span><\/span><span class=\"EOP SCXW193635702 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-93711f0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Performance Variability<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d530e23 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\">Shared cloud resources can experience performance fluctuations due to <\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\">network congestion<\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\"> or <\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\">SLAs<\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\"> with providers. NDR solutions can help <\/span><span class=\"NormalTextRun SCXW248946493 BCX0\">monitor<\/span><span class=\"NormalTextRun SCXW248946493 BCX0\"> and diagnose these variations, although limited control over <\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\">cloud infrastructure<\/span><\/span><span class=\"TextRun SCXW248946493 BCX0\"><span class=\"NormalTextRun SCXW248946493 BCX0\"> may hinder optimization.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-14976ea elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Complexity of Multi-Cloud and Hybrid Environments<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-37db35e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW94876504 BCX0\"><span class=\"NormalTextRun SCXW94876504 BCX0\">Many organizations now use multiple cloud providers, each with unique monitoring tools. NDR solutions can integrate these tools, offering comprehensive monitoring across multi-cloud setups.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ee5d4ec elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. Data Overload and Alert Fatigue<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-11387b7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW190514232 BCX0\"><span class=\"NormalTextRun SCXW190514232 BCX0\">With high volumes of alerts, teams can experience <\/span><\/span><span class=\"TextRun SCXW190514232 BCX0\"><span class=\"NormalTextRun SCXW190514232 BCX0\">alert fatigue<\/span><\/span><span class=\"TextRun SCXW190514232 BCX0\"><span class=\"NormalTextRun SCXW190514232 BCX0\">. Effective NDR configuration helps ensure that only the most critical threats are flagged, reducing <\/span><span class=\"NormalTextRun SCXW190514232 BCX0\">noise<\/span><span class=\"NormalTextRun SCXW190514232 BCX0\"> and enabling faster response times.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-090351e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">5. Security Concerns<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e15335f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Traditional protocols aren\u2019t always effective for cloud-based network security, so modern security controls and identity and access management (IAM) are essential to protect against unauthorized access.\u00a0<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3643bdb e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-eb2d587 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Does Cloud NDR Integrate with Cloud Platforms in hybrid environment?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c4dee43 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW183484794 BCX0\"><span class=\"NormalTextRun SCXW183484794 BCX0\">Cloud NDR seamlessly integrates with cloud platforms through several mechanisms designed to offer continuous protection and response capabilities. Here are some of the main ways it works:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b6ecc33 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. API Integration<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-031acce elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\">NDR leverages <\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\">APIs<\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\"> to connect with <\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\">cloud service providers (CSPs)<\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\">, gaining access to crucial data like activity logs, security events, and asset inventories. This integration allows <\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\">NDR systems<\/span><\/span><span class=\"TextRun SCXW52696581 BCX0\"><span class=\"NormalTextRun SCXW52696581 BCX0\"> to <\/span><span class=\"NormalTextRun SCXW52696581 BCX0\">monitor<\/span><span class=\"NormalTextRun SCXW52696581 BCX0\"> for unusual patterns, like compromised accounts or suspicious data flows, offering a comprehensive security view across cloud ecosystems.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ad46fc3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Ingestion of Cloud Logs and Flow Data<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aa9bb60 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW122221514 BCX0\"><span class=\"NormalTextRun SCXW122221514 BCX0\">By ingesting logs from cloud platforms (e.g., AWS VPC Flow Logs or Azure Network Watcher), <\/span><\/span><span class=\"TextRun SCXW122221514 BCX0\"><span class=\"NormalTextRun SCXW122221514 BCX0\">NDR solutions<\/span><\/span><span class=\"TextRun SCXW122221514 BCX0\"><span class=\"NormalTextRun SCXW122221514 BCX0\"> can track east-west traffic, which is essential for spotting lateral movement between cloud workloads and detecting internal threats.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-663038c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Sensor Deployment<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b654eef elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW113435091 BCX0\"><span class=\"NormalTextRun SCXW113435091 BCX0\">Some <\/span><\/span><span class=\"TextRun SCXW113435091 BCX0\"><span class=\"NormalTextRun SCXW113435091 BCX0\">NDR providers<\/span><\/span><span class=\"TextRun SCXW113435091 BCX0\"><span class=\"NormalTextRun SCXW113435091 BCX0\"> offer lightweight sensors for intra-cloud traffic monitoring. These sensors enable a detailed view of <\/span><\/span><span class=\"TextRun SCXW113435091 BCX0\"><span class=\"NormalTextRun SCXW113435091 BCX0\">network interactions<\/span><\/span><span class=\"TextRun SCXW113435091 BCX0\"><span class=\"NormalTextRun SCXW113435091 BCX0\"> across various cloud resources, improving detection of potential threats arising from internal communications.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b0669ec elementor-blockquote--skin-boxed elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cPlan sensor types and deployment locations so that the most relevant network traffic can be analyzed.\u202fProper positioning of the NDR sensors is\u202fcritically important\u202fto achieve complete visibility, limit the number of false positives, and control the cost of the deployment.\u201d \t\t\t<\/p>\n<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\u2013 2024 Gartner Hype Cycle report\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3c0e867 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. Behavioral Analytics<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-880a780 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\">Using <\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\">machine learning models<\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\"> to analyze network and user behavior, <\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/ndr-detect-threats-modeling-application-protocol-behaviors\/\">NDR solutions<\/a><\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/ndr-detect-threats-modeling-application-protocol-behaviors\/\"> detect abnormal patterns<\/a>, such as command-and-control communications or <\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\">data exfiltration<\/span><\/span><span class=\"TextRun SCXW70773007 BCX0\"><span class=\"NormalTextRun SCXW70773007 BCX0\"> attempts. These advanced analytics allow NDR to stay ahead of threats that traditional tools may miss.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7ec7ef9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">5. Automated Response Capabilities<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5a42055 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW58898783 BCX0\"><span class=\"NormalTextRun SCXW58898783 BCX0\">If suspicious activity is detected, NDR solutions can trigger automated responses, such as isolating compromised resources or halting unauthorized data transfers. This level of automation <a href=\"https:\/\/fidelissecurity.com\/use-case\/incident-response\/\">accelerates incident response<\/a> and lightens the load on security teams.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-19e77c7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">6. Integration with Other Security Tools<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b1f467e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\">Cloud NDR<\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\"> integrates with existing security solutions\u2014like <\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\">Security Information and Event Management (SIEM)<\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\">, <\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\">Security Orchestration Automation and Response (SOAR)<\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\">, and <\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\">endpoint detection<\/a><\/span><\/span><span class=\"TextRun SCXW170999471 BCX0\"><span class=\"NormalTextRun SCXW170999471 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\"> tools<\/a>\u2014supporting a unified approach to threat management across the security ecosystem.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f5cb8b4 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-990c44a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Does NDR Address Cloud and Hybrid Security Challenges?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d9534f6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\">In a hybrid environment, resources are spread across <\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\">data centers<\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\"> and cloud platforms, making <\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\">network security in the cloud<\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\"> a key concern. NDR solutions provide <\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\">continuous monitoring<\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\"> and <\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/use-case\/threat-detection\/\">real-time threat detection<\/a><\/span><\/span><span class=\"TextRun SCXW112936559 BCX0\"><span class=\"NormalTextRun SCXW112936559 BCX0\"> across all network segments. Here\u2019s how NDR enhances security across both cloud and on-premises systems in a hybrid setup:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4fd8881 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Unified Visibility Across On-Premises and Cloud Networks<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3e83a92 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud network detection and response solutions offer centralized <a href=\"https:\/\/fidelissecurity.com\/use-case\/cloud-visibility-and-control\/\">visibility<\/a> across both cloud-based networks and physical infrastructure. This ensures that security teams can monitor network traffic in real-time, identifying malicious activities in both environments.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Hybrid <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/what-is-threat-detection-and-response\/\">Threat Detection and Response<\/a>: By enabling cloud NDR capabilities, organizations can track data flows and access patterns to catch unauthorized access attempts, data breaches, and denial-of-service attacks regardless of whether they occur on-premises or in the cloud. <\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c1944b4 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Protecting Data and Network Traffic<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d3d5b59 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Security: In hybrid environments, data encryption and security controls become vital. NDR systems monitor encrypted traffic for hidden threats, helping to detect suspicious activity without compromising <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-security\/\">data security<\/a>.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuous Monitoring and Risk Reduction: With NDR solutions, organizations can set thresholds based on normal behavior to catch anomalies like spikes in traffic or unusual remote access patterns, thereby reducing the risk of intrusions.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-67f168f3 e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-6f7e64f3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Secure Your Hybrid Network with Fidelis NDR<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-25897b4e elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Unify Network Defense &amp; Decryption<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Auto Threat Detection and Response<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reduce Alert Fatigue<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ac67b91 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/solution-brief\/network-solution-brief\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Solution Brief Now<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bce4bcf e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8cc7881 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Does NDR Secure Remotely Accessed Resources in Hybrid Setups?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b311410 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">As remote work becomes more prevalent, <\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">NDR<\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\"> is essential for securing access to cloud and on-premises systems. With <\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">cloud network security<\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\"> measures, NDR solutions <\/span><span class=\"NormalTextRun SCXW251334389 BCX0\">monitor<\/span> <\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">gaining access<\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\"> events to protect against unauthorized attempts and <\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">threat actors<\/span><\/span><span class=\"TextRun SCXW251334389 BCX0\"><span class=\"NormalTextRun SCXW251334389 BCX0\">. Here are the main strategies for securing remotely accessed systems:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1da2744 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Monitoring Remote Access with Cloud Network Security Controls<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1b88359 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">NDR provides security control mechanisms tailored to remote access. These controls are essential to ensuring that only authorized users can access hybrid resources, from virtual machines to sensitive databases.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Limiting Compromised Credential Impact: With network security cloud features, NDR tools monitor for signs of credential theft and unauthorized access, catching issues early before they lead to significant breaches.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7c3f8f9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Automated Response to Security Threats<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-38cffa6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">By utilizing security information and event management (SIEM) integration, NDR can trigger automated responses across the hybrid network. For example, if NDR identifies a threat actor attempting malicious activities, the system can automatically block IPs or isolate compromised resources.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e557574 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-707025d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Is Cloud-Native NDR the Future of Network Security?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b2724a4 elementor-blockquote--skin-boxed elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cBy 2029, more than 50 percent of incidents discovered by NDR technology will come from cloud network activity, up from less than 10 percent today.\u201d \t\t\t<\/p>\n<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\u2013 2024 Gartner Hype Cycle report\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aa817f5 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Lets see why?<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-651722c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The future of network security lies in cloud-driven solutions that adapt to the complexities of cloud networks. <\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud-native NDR offers scalable, agile protection against cloud threats, ensuring that as network perimeters expand, security keeps up.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">With increasing remote access and more sophisticated cloud threat detection capabilities, cloud NDR is essential for robust protection.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-732fd80 elementor-blockquote--skin-clean elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t&#8220;With 64% of UK executives acknowledging they haven\u2019t fully mitigated cloud adoption risks, the PwC report underlines the essential role of proactive security tools like NDR to fill critical gaps in network and cloud security.&#8221; \t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b27f55d e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-b8b908f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Fidelis NDR Enhances Security in Cloud-Native Applications<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-841a031 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<strong>Comprehensive Visibility:<\/strong> Monitors traffic across all cloud networks, including components like data centers and cloud-native environments, to capture threats and maintain visibility at all times.\u00a0<strong>Real-Time Threat Detection:<\/strong> Detects abnormal network behavior early, reducing risks associated with data breaches and helping organizations apply cloud data security best practices.<strong>Encrypted Traffic Analysis:<\/strong> With more data encryption in place, Fidelis NDR uncovers hidden threats in encrypted data streams without compromising security.<strong>Automated Incident Response:<\/strong> Automates responses to threats, such as isolating compromised resources or blocking malicious activities, while securing remotely accessed resources.<strong>Advanced Threat Hunting:<\/strong> Combines real-time monitoring with historical analysis to hunt for vulnerabilities within network and cloud security setups, strengthening security across all network perimeters.\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-76b50c9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Through these advanced mechanisms, Fidelis NDR brings unmatched network and cloud security capabilities to cloud-native applications and data centers alike, ensuring that cloud data security best practices are met in every interaction.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/ndr-for-cloud-and-hybrid-environments\/\">NDR in the Era of Cloud and Hybrid Environments: Why It\u2019s Essential<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>&#8220;The PwC Cybersecurity Outlook Report reveals that 39% of UK senior executives expect cloud-related threats to significantly impact their organizations this year, surpassing traditional threat concerns.&#8221; With cloud infrastructures expanding across private, public, hybrid, and multi-cloud models, effective security monitoring is essential. Gartner\u2019s 2024 Hype Cycle for Workload and Network Security suggests that NDR solutions [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1044,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1043"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1043"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1044"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}