Our Price: $68.00
Minimum 51 quantity
Our Price: $60.00
Minimum 101 quantity
Our Price: $57.50
Minimum 251 quantity
Our Price: $50.00
More pricing below, click here!
Overview:
Enterprise Class NDR Without the Complexity
ThreatSync+ NDR is a 100% Cloud-native, AI-powered network threat detection and response solution. ThreatSync+ NDR integrates with existing WatchGuard solutions, requires no hardware, and defends on-premises, Cloud, VPN, and identity threat surfaces. It detects suspicious network activity that indicates a network breach and assists customers in remediation. NDR offers enhanced threat detection for Fireboxes, and their associated switched LAN infrastructure. It provides advanced reporting to ensure network compliance. ThreatSync+ NDR provides organizations with affordable, easy-to-operate network and Cloud defense solutions that protect against sophisticated cyberattacks.
Once network risks and threat events are identified, ThreatSync+ NDR sends them to ThreatSync XDR for remediation, providing a unified orchestration response. Together, they streamline cybersecurity, enhance visibility, automate response actions across the organization more quickly, reduce risk and cost, and offer greater accuracy.
Lower Costs with Cloud-Native Architecture
100% open Cloud-native architecture removes the need for new hardware. ThreatSync+ NDR operates in the WatchGuard Cloud and works with your existing WatchGuard Firebox or third-party firewall as well as routers and switches, delivering rapid time to value and reducing the cost and complexity of managing hardware.
Detect Threats with Cutting-Edge AI
Running a multi-tier neural network, operating flow-based unsupervised and semi-supervised machine learning, ThreatSync+ NDR ingests NetFlow and quickly detects attacks that have bypassed perimeter defenses and are actively expanding in the network. The AI engine identifies C&C, lateral movement, unusual access, unusual data movement, beaconing, scanning, and other traffic-based attack processes.
Surface Hidden Network Risks
ThreatSync+ NDR continuously monitors your entire network for changes and applies intelligent risk scoring to focus your efforts on what is essential. From identifying all the devices operating on your network to alerting with rogue devices, new IoT devices or known vulnerabilities are discovered, ThreatSync+ NDR allows you to take back control of your network.
Execute Rapid Detection and Response
ThreatSync+ NDR reduces detection times to minutes and identifies attacks early enough to take action to prevent their damage. This includes identifying ransomware attacks early enough to block encryption and prevent internal network penetration from reaching partner networks. Working with ThreatSync remediation workflows, IT teams will reduce dwell times from weeks to hours.
Designed For Small Teams
Unlike traditional NDR solutions designed for a manpower-heavy SOC, ThreatSync+ NDR automation, intelligence, and operations are specifically designed for the operations of your existing team. No new headcount is required, training is simple and fast, and the product is intuitive and easy to operate. ThreatSync+ NDR delivers enterprise-class SOC capabilities without a high workforce or operational cost.
Built for Small IT Security Teams
ThreatSync+ NDRs’ unique Cloud-native delivery model provides enterprise-class cybersecurity at a fraction of the cost of traditional NDR or SIEM tools. Deployed in just hours, ThreatSync+ NDR is designed for operational success in any environment.
Benefits and Features:
Benefits
- Compliance status is evaluated with a button click. Reports are generated quickly for auditors, partners, suppliers, and insurance providers.
- Cost of compliance is reduced by automating highly manual processes, reducing workloads on IT teams.
- Compliance posture is improved through control effectiveness reports and take practical remediation actions with improvement guidance.
- Simplified compliance process includes easy-to-configure, out-of-the-box control sets and reports to support new and changing requirements.
Features
Enterprise AI-driven accuracy in detecting attacks operating inside your network, including:
- Ransomware
- Supply Chain Attacks
- Vulnerabilities
- VPN Threats
- Command & Control (C2)
- Man-in-the-Middle
- Unauthorized Web & DNS Activities
- Masqueraders (Tunneling)
- Credential Compromise
- Rogue Behaviors
- Insider Threats
- Lateral Movement
- Data Exfiltration
Out-of-the-box NIST and ISO policy-based, AI-powered control frameworks support continuous compliance and compliance reporting.
ThreatSync and Firebox integration enables the coordination and automation of multiple processes and tools with security orchestration, providing a cohesive security posture.
Deployment:
ThreatSync and ThreatSync+ NDR
Deliver Affordable, Expansive, and Unified Threat Detection and Response
Anatomy of a Threat Report:
How much visibility do you have into what is happening on your network? Which devices are communicating with each other, and what types of data are being transmitted to and from your network? Understanding your network’s activities and identifying its risks and threats are crucial for protecting your entire organization and your suppliers, partners, and customers.
By proactively assessing your network’s security status with automated risk and threat reports, you can identify vulnerabilities or cyberattacks that may have evaded your perimeter defenses. This proactive approach empowers you to address these issues before damage occurs, strengthening your cybersecurity strategy and safeguarding your organization.
Core Network and Ransomware Reporting
ThreatSync+ NDR includes a Network Threat Report and Ransomware Defense Report. Both reports start with a summary section that displays the entire network’s overall risk score and trend. They then provide detailed information on various policies and controls actively monitored by the NDR system. Each sub-section shows the individual threat score and trend line for each policy or control being monitored, and if any gaps or failures are found, guidance on how to remediate them. These reports are easily customizable to meet the specific needs of organizations or cyber defense programs. Their purpose is to highlight existing issues and provide managers with a way to establish network defense goals and track progress and improvements toward them.
Network Threat and Ransomware defense reports provide highly detailed assessments of what is happening inside your network. They are essential to your cyber defense program because they provide the information needed to understand your security posture and what steps to take to improve it. The specific information included will vary depending on the assessment findings but typically include:
- A list of all the security risks that were identified.
- The criticality level of each risk, typically classified as critical, high, or medium.
- A description of each risk, including the type, severity, and potential impact.
- Recommendations for removing each risk, such as installing security updates, removing malware, isolating devices, changing credentials, or configuring security settings.
Examples of specific security risks that may be identified in the assessment:
- Activity on unsecured ports
- Command and control detection
- Unauthorized remote access
- Failed backups
- Unnecessary and unusual port activity
- Actively exploited vulnerabilities
- Open alerts
- Unidentified and high-risk devices
- Policy violations
- Malicious network activity
- SMB leakage
- Unusual VPN activity
ThreatSync Purchase Options:
ThreatSync offers a core set of XDR capabilities, including AI-driven event correlation and remediation, available at no added charge with qualifying network and endpoint security product purchases. ThreatSync+ product licenses are purchased separately, adding an additional layer of advanced XDR threat detection, capabilities, such as third-party data feeds and deep AI-based monitoring, detection and investigation.
ThreatSync Core
ThreatSync+ NDR
Compliance Reporting
WatchGuard’s family of ThreatSync XDR products enables MSPs and companies of every size to build XDR functionality, including the advanced capabilities needed to protect their environments. Select and deploy the ThreatSync products to tailor a solution to your needs.
- ThreatSync Core includes foundational XDR capabilities of 1) threat information correlation, 2) incident scoring and management, and 3) intelligent automated remediation. The ThreatSync Core features are platform-ready, and are available with participating WatchGuard product activation for no additional charge.
- ThreatSync+ product licenses can be purchased separately to layer on advanced XDR capabilities such as 3rd-party product feeds and deep AI-based monitoring, detection and analysis.
ThreatSync+ products include:- ThreatSync+ NDR: a 100% Cloud-native, AI-powered network threat detection and response solution that requires no hardware and defends on-premises, VPN, and identity threat surfaces and defends North/South, East/West, VPN, and internal device threat surfaces.
- Future ThreatSync+ products coming in 2024 and 2025
- WatchGuard Compliance Reporting augments the reports available with ThreatSync products and WatchGuard Cloud to provide a rich package of reports for companies that need to continuously ensure compliance with regulations for business and financial success. This package is used with XDR solutions to provide on-demand compliance reporting and optimal compliance practices.
ThreatSync Core | ThreatSync+ | Compliance Reporting | |
---|---|---|---|
Included with WatchGuard products | Requires additional licenses | Optional add-on, requires additional license | |
Threat information correlation | |||
Incident scoring and management | |||
Intelligent automated remediation | |||
100% Cloud native | |||
Includes WatchGuard network & endpoint security products | |||
Standard XDR reports | |||
Includes open XDR architecture (3rd-party products) |
|||
Continuous monitoring advances | |||
Integrated AI detection | |||
AI correlation analysis | |||
Advanced Network, Device, Traffic, and Incident Dashboards | |||
Comprehensive N/S/E/W Network Detection and Response (NDR) | With ThreatSync+ NDR license | ||
Network Threat Visibility and CISA Ransomware Defense Reports | With ThreatSync+ NDR license | ||
Over 100 regulatory controls mapped to compliance reports | * | ||
Automated continuous compliance for ISO- 27001, NIST, CMMC, UK and Cyber Essentials | |||
Configurable to support insurance audit compliance with CIS Critical Security Controls, and IEEE standards |
* Regulatory control frameworks for networks are built into the ThreatSync+ NDR license. These control frameworks drive the information that is delivered via WatchGuard Compliance Reporting.
Partner FAQ:
What is being announced?
We are pleased to announce the launch of ThreatSync+ NDR and WatchGuard Compliance Reporting. These products are based on the technology acquired from CyGlass in September of 2023. The marketing release of the product: June 25. GA release: June 28.
Why are we adding ThreatSync+ to the NDR name?
WatchGuard acquired CyGlass back in September of 2023. With that purchase, we acquired an advanced unsupervised and semi-supervised layered neural network AI engine that can process billions of data flows to find risks and threats across any environment. That AI engine is the heart of the new ThreatSync+ family of products. Beginning with network flow data in ThreatSync+ NDR, WatchGuard will add new data inputs into the ThreatSync+ AI engine and deliver world-class threat detection and response solutions for all threat surfaces across an organization. ThreatSync+ NDR is just the beginning. Future ThreatSync+ products will include Cloud platforms, endpoints, identity directories, secure edge devices, and more.
How does ThreatSync+ expand on WatchGuard's XDR strategy?
ThreatSync, as we know it today, will continue to be a platform capability that delivers the foundation of WatchGuard's XDR strategy, most notably providing the unified remediation and response engine necessary for XDR capabilities. The ThreatSync+ AI engine will layer on advanced AI-based threat detection and analysis and open the door to third-party participation to grow and expand WatchGuard's XDR offering, creating an Open XDR solution that can compete and win against any existing XDR tool in the market. WatchGuard customers and partners get the foundational XDR engine – which we will call the ThreatSync Core functionality – whenever they purchase qualifying products without any additional license purchase. They can add ThreatSync+ licenses to customize their XDR solution to fit their unique needs, beginning with our ThreatSync+ NDR license now, and the ThreatSync+ SaaS license later in 2024. ThreatSync Core and ThreatSync+ NDR work seamlessly for powerful XDR functionality.
What does ThreatSync+ NDR do?
ThreatSync+ NDR is a network detection and response solution that uses the ThreatSync+ AI engine to continuously monitor all north/south and east/west traffic flows for risks and threats. ThreatSync+ NDR will gather network traffic flows from firewalls, routers, and switches and build AI-defined models of what is normal and anomalous. Working with an integrated policy engine, the AI engine will correlate and present the anomalies as risk-scored and prioritized incidents. Cyber defenders will see a short, prioritized view of the risks and threats in a series of dashboards that display those risks and threats in terms of location, devices, users, and timelines. ThreatSync+ NDR can take billions of network conversations and find in them the five or six critical items cyber defenders must focus on to protect their organizations, along with guidance on how to mitigate them.
What makes ThreatSync+ NDR different and unique?
ThreatSync+ NDR differentiators include:
- ThreatSync+ NDR was designed for our customers, and businesses who operate with smaller IT teams and limited cybersecurity resources. Where other NDR tools are complex to operate, require a full security operations center to truly utilize, and force the deployment of multiple hardware clusters, ThreatSync+ NDR operates in the WatchGuard Cloud. It deploys rapidly (in less than an hour per location) and instantly if you are using Firebox firewalls, requires no new on-premises hardware as it utilizes the infrastructure you have, operates as a stand-alone from a SIEM or a SOC, and its simplicity means small IT teams can operate it.
- ThreatSync+ NDR delivers enterprise-class machine learning. It is one of the market's most advanced AI detection engines, cutting through the noise of billions of network flows to surface actionable risks and threats quickly and efficiently. It includes specialized AI models to detect advanced threats like ransomware, vulnerability-based attacks, supply chain attacks and more. It watches continuously, 24x7, looking for the attacks that get through your perimeter defenses.
- ThreatSync+ NDR automates and simplifies continuous monitoring, detection, and remediation. It significantly reduces the workload for small teams. The AI engine does the work for you, and the easy-tounderstand dashboards, guidance, and reporting mean any IT team member can operate the solution.
- ThreatSync+ NDR works seamlessly with WatchGuard Firebox and ThreatSync Core. It also supports thirdparty firewalls like Fortigate and Meraki and industry-standard routers and switches, making it effective in any organization.
What is WatchGuard Compliance Reporting?
WatchGuard Compliance Reporting is an additional add-on license for organizations that must prove compliance in highly regulated industries. ThreatSync+ NDR includes hundreds of network controls defined by the NIST, ISO, CISA, and Cyber Essential standards. These controls are easily activated at deployment. WatchGuard Compliance Reporting allows IT and compliance teams to activate and report on regulatory laws built from these standards. Compliance reports that come out of the box include FFIEC, NIST-171, CMMC, GPDR, IEEE, and many more. Reports are also easily configured to report in compliance with custom standards imposed by a cyber insurer or industry standards like Motion Picture Association (MPA) compliance or supply chain vendor third-party risk assessments. WatchGuard Compliance Reporting automates the traditionally manual/spreadsheet-driven IT control compliance process.
How is WatchGuard Compliance Reporting different?
Existing NDR and XDR tools do not include a compliance reporting capability. They are separate, expensive, complex tools usually built around a legacy Governance Risk and Compliance product (GRC). At the same time, many of WatchGuard's customers are small and midsize enterprises that must prove compliance with regulatory laws and do not have the resources to deploy GRC types of products. WatchGuard Compliance Reporting fills that gap, delivering a simple-to-use report creation framework and automated report creation, delivering an affordable, efficient compliance reporting solution. WatchGuard Compliance Reporting key selling features include:
- With a click of a button, WatchGuard Compliance Reporting generates regulatory compliance reports automatically to prove adherence to compliance standards.
- Reports are easily created, configured, and modified for new or changing regulatory needs.
- The reports generated by WatchGuard Compliance Reporting provide a comprehensive view of the effectiveness of each control, the risk associated with any failed control, and an overall risk and compliance score for the entire compliance program.
- Working with current and future ThreatSync+ family of products, WatchGuard Compliance Reporting ensures that compliance reports are constantly updated. This continuous compliance process provides auditors with instant visibility.
- Compliance reports for specialized control effectiveness reporting for insurance, vendor third-party risk, and industry oversight trade associations are also easily created and configured as needed.
- There is no limit on how many compliance reports can be created, and the automated structure of the report creation eliminates expensive manual compliance tracking.
Who are these solutions targeting?
ThreatSync+ NDR and WatchGuard Compliance Reporting are designed for businesses of any size that operate with lean IT teams and limited cybersecurity skills/resources. That is often the case for small and midsized businesses a market largely underserved by vendors selling NDR, XDR, and compliance products. ThreatSync+ NDR is compelling for organizations as small as 50 employees to organizations as large as 30,000.
How are these solutions being packaged?
The June 28 release includes two new SKUs. ThreatSync+ NDR, the first of the ThreatSync+ family of solutions, includes an advanced AI detection engine, specialized AI models to detect advanced network and device risks and threats, hundreds of industry-standard best practice network controls, and the ability to ingest data from Firebox and third-party firewalls as well as industry-standard routers and switches. The second new SKU is WatchGuard Compliance Reporting. WatchGuard Compliance Reporting is an add-on solution to the ThreatSync+ NDR solution and is the compliance reporting engine that overlays the entire ThreatSync+ family.
Is ThreatSync and ThreatSync+ included in the WatchGuard TSS bundle?
The ThreatSync Core capabilities remain a part of the WatchGuard TSS bundle, just like it is today. All ThreatSync+ solutions, including ThreatSync+ NDR, are activated with an additional license that customers must purchase. This approach is because WatchGuard focuses on serving all organizations. Some customers need core XDR capabilities but not the more advanced capabilities in the ThreatSync+ solution. The packaging models allow every organization to utilize the incident correlation and response capabilities in ThreatSync Core along with the detection capabilities of the endpoint (EPDR) and network (Firebox) that WatchGuard currently offers. Organizations with greater cybersecurity requirements and/or complex hybrid environments can add ThreatSync+ protection levels to protect their environments, building an XDR solution that fits their needs and benefiting from WatchGuard products work seamlessly together.
How are these solutions being licensed?
ThreatSync+ NDR and WatchGuard Compliance Reporting are priced per user per year. Each per-user license includes up to two devices, e.g., the user's laptop and mobile device. IoT devices are priced at two IoT devices per license and utilize a per-user SKU. As the number of devices and volume of dataflows constantly change, per user is the easiest, most accurate, and fairest pricing model for these solutions. A license can be purchased on a one- or three-year basis, which includes discounts for multi-year purchases. Discounts are also available based on volume. Please refer to the most current WatchGuard price list for specific numbers.
What does ThreatSync+ NDR protect?
ThreatSync+ NDR protects on-premises networks from attack. It is especially good at finding attacks that have bypassed perimeter defenses, including ransomware, vulnerability, and supply chain attacks. It seems that every week, a new major attack occurs. These organizations have firewalls and some type of endpoint defense; still, the attacks get through. This is because some attacks find gaps, like new or unpatched vulnerabilities, to bypass these defenses, or the attacks are more advanced than the existing defenses. ThreatSync+ NDR watches for attacks as they unfold in the network. The attackers cannot see the NDR tool, but the NDR tool uses AI to search out the attackers' actions buried in the network traffic. The attacker cannot hide because they must use the network to expand their attack. That means NDR is uniquely capable of detecting unfolding attack stages, including command and control calls, lateral movement in the network, reconnaissance scans done on networks and subnets, datastaging movement in the network, malware and encryption packages being deployed in the network, and data exfiltration.
If NDR is so powerful, what is it not used by every organization?
NDR is used by almost every large enterprise with a SOC. However, legacy NDR vendors rely on complex hardware and taps to capture and analyze network traffic. Other organizations want to deploy NDR but cannot, due to resource constraints. ThreatSync+ NDR is different. It does not require any new hardware and operates in the WatchGuard Cloud. That means it costs less to deploy and operate. It is one of the few NDR solutions that can be successfully deployed and operated by organizations with lean IT teams.
What Type of AI is in ThreatSync+ NDR?
The ThreatSync+ AI engine is a modern unsupervised and semi-supervised flow-focused machine learning engine that utilizes multiple math theorems and statistical models, depending on the data, to create continuous baselines that define "normal" operations and anomalous activities. A second set of machine-learning models, working in conjunction with policies, looks specifically at the anomalies to determine if they are threats. This duallayered "neural network" approach is unique and essential because the data sets are so large that no human or policy-based tool can effectively utilize the information hidden within. At the same time, the AI needs additional context about the environment to determine what is risky or threatening versus what is simply different. The result is that the ThreatSync+ AI engine can take millions, even billions, of data flows and boil them down into a risk-prioritized view of what needs attention and what to do about it.
Why do customers deploy an NDR alongside a firewall solution?
Firewalls are policy-based enforcement systems with file inspection to look for malicious payloads. They effectively manage port and protocol traffic and stop known threats when configured correctly. ThreatSync+ NDR is a threat detection system that adds another layer of intelligence (AI) to the firewall's policy and UTM capabilities. ThreatSync+ NDR deeply analyzes network traffic from firewalls and network flows through routers and switches to see risks and threats beyond what's possible with firewall inspection alone, including:
- North/south traffic and open-port threats that a firewall may miss due to a misconfigured policy or a new or changing threat.
- East/west traffic risks and threats, including compromised applications (e.g., SolarWinds), a compromised user account when MFA is not in place, and a compromised endpoint missed or not covered by the local EDR defense (in memory attack, compromised user attack, application compromise, unprotected, new, or rogue device with no EDR deployed).
In addition to improving visibility into risks and threats in the network - north/south, east/west, NDR also detects and defines all devices operating on the network and alerts when new devices appear.
Mean time to detect (MTTD) is dramatically reduced with ThreatSync+ NDR. Dwell times for attacks run between 15 and 90 days, but an attack like ransomware needs less than five days to complete its mission. ThreatSync+ NDR, continuously watching network traffic, can detect the attack missed by other sensors. Attacks create anomalous traffic that NDR will quickly detect and alert on. Dwell times drop to hours, meaning attacks can be stopped before damage is done.
Who are the key competitors in the NDR market?
There are many competitors in the NDR market. Most are legacy vendors who focus solely on selling to large enterprises. These include Fidelis, Vectra, ExtraHop, and Plixer, and they will rarely be found in our target market. If you find a partner who is reselling one of these legacy players and the partner targets the SME market, go after that account, as the value of ThreatSync+ NDR will be immediately apparent.
The second set of competitors are the stack vendors – Cisco, Fortinet, Sophos, and Microsoft. Cisco, Fortinet, and Sophos acquired smaller legacy hardware vendors and brought these products to market within their security tool stack. Their NDR solutions are hardware-based, deployed locally in the legacy model, and require significant integration work to get them to work with anything but the vendor's stack – they are closed solutions. Microsoft does not offer an NDR solution, but it has NDR capabilities included in the E-5 license. The capabilities are related to network monitoring and work as an MS Sentinel (SIEM) component. The capabilities do not include AI-driven threat detection; it is purely a policy-based view where remediation happens in Sentinel.
DarkTrace will be the most aggressive competitor you will run into in the market. They are focused on NDR sales and have a significant direct selling team. They target mid-market companies with thousands of US and UK customers. Their tool is a hardware-based solution that must be deployed locally with a network tap. It is costly and complex. They tout their AI capabilities, and 20 years ago, they were on the forefront of unsupervised machine learning. Today, they are not. There are customer complaints about false positives and negatives all over the Internet. The requirement for local hardware makes upgrading their AI and software difficult, putting them technically behind our ThreatSync+ engine. They are also universally disliked by partners and customers for their aggressive business practices.
How does our NDR product handle encrypted traffic?
This question will be asked by any cybersecurity professional who has been in the industry for over ten years. In the days before AI was applied to cybersecurity and encrypted traffic was the norm, NDR tools would tap network traffic, open packets, and read the entire traffic body. NDR and DLP (data loss prevention) tools overlapped back then. As more and more traffic became encrypted, Legacy NDR vendors created new ways and more powerful hardware to decrypt and follow the same "packet capture model." This is one reason why so many NDR vendors are floundering after COVID. Shipping big hardware worldwide became a big problem with supply chain failures. Ultimately, the full packet capture and decrypt model is broken, not because you cannot do it; you can with enough hardware and can and still get results in a reasonable amount of time. The issue is the cost and complexity. All the power and all that hardware, not to mention the storage costs, makes this approach only suitable for very large organizations with fully capable security operations centers.
ThreatSync+ NDR takes an entirely different approach. The solution can still capture the full packet, but our AI eliminates the need to look inside the packet. Instead, we look at all the information about the packet (metadata) and the related flow information. With that information, ThreatSync+ AI can determine if the packet is anomalous, how much risk the packet and flow create, and if the packet is related to a specific stage of a cyberattack. This model is cleaner, faster, and much less complex and finds all of the same risks and threats that legacy tools can find. If a partner or prospect does not believe you, show them a sample threat report and tell them to try the solution out. It only takes 40 minutes to deploy – as opposed to the weeks it takes to deploy a legacy NDR tool.
What are the deployment options for ThreatSync+ NDR
ThreatSync+ NDR operates in the WatchGuard Cloud. You simply configure local firewalls, routers, and switches to enable ThreatSync+ NDR to securely capture data flows and logs, as the solution uses the infrastructure and firewall investments the customer has already made. The deployment can be set to capture north/south traffic from Firebox or third-party firewalls or connect to routers and switches to collect east/west network traffic or both. You never have to deploy additional hardware.
Is ThreatSync+ NDR suitable for MSPs?
Yes, ThreatSync+ NDR is a powerful, easy-to-deploy, and high-value solution for MSP partners. The partners can deploy and manage the solution at their customers' sites via the WatchGuard Cloud and ThreatSync+ user management interface. There is no need for the MSP to deploy hardware. The ThreatSync+ UI will enable them to monitor and respond to risks and threats found by the solution, configure and modify control frameworks and policies to align the solution's continuous monitoring capabilities for each individual customer's environment, and create, configure and deliver threat or compliance reports quickly and efficiently. ThreatSync+ NDR, deployed by an MSP, will allow the partner to deliver a higher level of cyber defense for their clients and create new service revenue streams to drive more business.
Will ThreatSync+ NDR be offered as a managed service?
Yes, the work to integrate the solution and train our SOC team on operating ThreatSync+ NDR in conjunction with existing technology needs to be completed. Then there will be announcements about its inclusion in our managed service offering.
How can I request a demo or trial of the NDR product?
To request a demo or trial of ThreatSync+ NDR, please contact us.
Who should I go to with more questions?
For any questions not addressed in this FAQ and other materials related to the launch of ThreatSync+ NDR, please contact us.
Documentation:
Download the WatchGuard ThreatSync+ NDR Datasheet (PDF).