Threat detection techniques have necessarily graduated from more simple network-based detection solutions to technologies focused on improving detection times, alerting and mitigating attacks as they are happening. Not only can a wide range of organizations now readily fall victim to an attack, malware often infiltrates quietly, persisting in networks after leveraging various points of entry and methods of obfuscation.

Offerings recognized in this category deliver detection and/or remediation capabilities for the entire network, including mobile devices, cloud applications, Internet-of-Things devices, and beyond, recognizing when bad actors penetrate the network, but also move laterally within.